News
Earthquakes, Cyber Breaches, and Mitigating Disasters through Design
By Archie Agarwal In an era where cyber threats are constantly evolving, relying solely on reactive security measures is inadequate. The imperative...
Agile Development: What You Need to Know
Everyone is a fan of agile development. And while there are many benefits to adopting an agile methodology, one of the most important is that it...
Vulnerability management, its impact and threat modeling methodologies
This recent article from Security Intelligence emphasizes the significance of vulnerability management in cybersecurity, outlining its continuous...
Understanding Live Cloud Environment and Threat Modeling
Cloud adoption is on the rise. And thanks to the pandemic, the rate of adoption is accelerating. Worth an already impressive $445.3 billion in 2021,...
Where are You in Your Threat Modeling Journey?
We like to say that to do it right, threat modeling cannot be a one-time project. Your threat modeling journey must be an ongoing process. In that...
6 Steps to Threat Model with Infrastructure as Code
When doing Infrastructure as Code (IaC), threat modeling is crucial for identifying and addressing potential security risks. Here are some key steps...
ThreatModeler Sets New Standard for Securing Infrastructure as Code with Launch of IaC-Assist 2.0
ThreatModeler©, a leader in threat modeling from design to code to cloud, today announced the launch of IaC-Assist 2.0, an integrated development...
ThreatModeler Launched IaC-Assist 2.0
ThreatModeler© announced the launch of IaC-Assist 2.0, an integrated development environment (IDE) that secures infrastructure-as-code (IaC) at the...
It pays to malvertise. MOVEit vulnerability remediation. Ransomware trends. FSB cyberespionage. Influence operators taken down.
ThreatModeler Sets New Standard for Securing Infrastructure as Code with Launch of IaC-Assist 2.0 (PR Newswire) ThreatModeler©, a leader in threat...