From Breach to Blueprint: Leveraging Threat Modeling to Unpack the 23andMe Cyberattack

From Breach to Blueprint: Leveraging Threat Modeling to Unpack the 23andMe Cyberattack

By Nikunj Nagalia, VP of Solutions Architecture Amidst the tumultuous year of 2023, 23andMe found itself ensnared in a harrowing breach, compromising the sanctity of its fortified defenses and laying bare the personal data of nearly 7 million users. This cyber siege...
ThreatModeler Winner of the Coveted Global InfoSec Awards 2024

ThreatModeler Winner of the Coveted Global InfoSec Awards 2024

ThreatModeler Software, Inc. Wins Trailblazing Threat Modeling IN 12th Annual Global InfoSec Awards at #RSAC 2024 SAN FRANCISCO (BUSINESSWIRE) MAY 6, 2024 – ThreatModeler Software, Inc. is proud to announce we have won the following award(s) from Cyber Defense...
ThreatModeler Announces Version 7.0

ThreatModeler Announces Version 7.0

Bringing Machine Learning and AI, Real-Time Collaboration, and Customized Risk Calculation to the Process of Automated Threat Modeling New features substantially simplify and ensure wider adoption of automated, real-time threat modeling to enable DevOps and security...
ThreatModeler Announces Version 7.0

Revolutionizing Automotive Security: ThreatModeler Introduces Free, Tailored Threat Models

Exciting News! ThreatModeler is revolutionizing automotive security with 18 cutting-edge threat models tailored for the automotive industry. Pre-built, vetted threat models are now available to address the unique security challenges facing the automotive industry...
Earthquakes, Cyber Breaches, and Mitigating Disasters through Design

Earthquakes, Cyber Breaches, and Mitigating Disasters through Design

By Archie Agarwal In an era where cyber threats are constantly evolving, relying solely on reactive security measures is inadequate. The imperative for proactive risk assessment and mitigation has never been greater. Much like CAD drawings provide a blueprint for...
Vulnerability management, its impact and threat modeling methodologies

Vulnerability management, its impact and threat modeling methodologies

This recent article from Security Intelligence emphasizes the significance of vulnerability management in cybersecurity, outlining its continuous process of identifying and handling vulnerabilities within an organization’s IT ecosystem. It highlights common...