In the ever-evolving landscape of cybersecurity, staying ahead of threats is not just a goal but a necessity. With the...
Our Blog
ThreatModeler partners with NYU to launch Threat Modeling Program
We are excited to announce the launch of our ThreatModeler Certified Practitioner Program - Introduction to Threat...
Empowering Women in Technology – International Women’s Day 2024
This International Women's Day, let's challenge the outdated narrative that has held back countless women in...
ThreatModeler Announces Version 7.0
Bringing Machine Learning and AI, Real-Time Collaboration, and Customized Risk Calculation to the Process of Automated...
Revolutionizing Automotive Security: ThreatModeler Introduces Free, Tailored Threat Models
Exciting News! ThreatModeler is revolutionizing automotive security with 18 cutting-edge threat models tailored for...
The Best Cyber Insurance is Not What You Think
Cyber insurance is now a big business (and growing more over time). Cyber insurance statistics show that claims grew...
Earthquakes, Cyber Breaches, and Mitigating Disasters through Design
By Archie Agarwal In an era where cyber threats are constantly evolving, relying solely on reactive security measures...
Why Threat Modeling?
Everyone involved in application development would rather prevent an incident than have to respond to one. The adage,...
Can You Code Your Way to Cybersecurity?
Yes, coding skills are highly valuable in the field of cybersecurity. Being able to write and understand code allows...
One Good Way to Know if Developers are Developing Secure Code
There was a time when developing secure code was just a good idea. Now, in many instances, it’s a...
Agile Development: What You Need to Know
Everyone is a fan of agile development. And while there are many benefits to adopting an agile methodology, one of the...
Vulnerability management, its impact and threat modeling methodologies
This recent article from Security Intelligence emphasizes the significance of vulnerability management in...