Architecturally-Based Process Flow Diagrams: Examples and Tips to Follow

Architecturally-Based Process Flow Diagrams: Examples and Tips to Follow

Threat modeling is catching on. Increasingly, organizations are coming to the realization that securing DevOps projects as early as possible – preferably during the initial whiteboard planning and design stages – not only reduces risk, it makes good business sense....
Realistic Threat Modeling: ThreatModeler vs. Microsoft TMT

Realistic Threat Modeling: ThreatModeler vs. Microsoft TMT

In our previous articles comparing ThreatModeler™ and Microsoft Threat Modeling Tool (Microsoft TMT), we considered the tools from an AppSec perspective and the CISO’s perspective. In this installment, we compare the capacity of each to provide outputs based on...
Outputs Beyond AppSec: ThreatModeler vs. Threat Modeling Tool

Outputs Beyond AppSec: ThreatModeler vs. Threat Modeling Tool

Threat modeling has a well-proven capacity to provide agile DevOps teams a “security heads-up,” during project design, especially in cases where application security is a critical priority. In our previous article comparing Microsoft’s Threat Modeling Tool (TMT) to...