News
How Developers Can Easily Learn to do Threat Modeling
What’s the easiest way to learn anything new? Don’t start from scratch. This means employing three strategies: 1) Use the skills you already have 2)...
DevSecOps & Automated Threat Modeling for Federal Agencies
ThreatModeler has seen a significant uptick in US federal government agencies and contractors approaching us to find out more about automating the...
Advantages of Modular Threat Modeling
Architectural patterns are those blocks of functions or components that tend to repeat over and again in systems and software. ThreatModeler...
What Is One-Click Cloud Threat Modeling?
A recent survey by Deloitte unearthed the extraordinary fact that “only 5.8% of professionals in cloud-savvy organizations experienced slowdown due...
How to Automate Threat Modeling Using ThreatModeler and Avocado
This is a recap of the "Automated Threat Modeling For Applications Using Avocado" webinar presented recently. To view the entire webinar (including...
Recap: ThreatModeler at Open Security Summit and New White Paper
The annual, five-day Open Security Summit is unique on the Information Security conference calendar as it entails security practitioners coming...
7 Cybersecurity Podcasts You Should Listen to Now
Technology continues to evolve at lightning speed, and hackers are working as fast as they can to manifest the latest cybersecurity threat. In this...
As the Nation Turns to Zoom for Video-Teleconferencing, Security Issues Surface
Practically overnight, the nation’s populace went from normal, everyday routine to remote work to address the coronavirus pandemic. To stay in touch...
Marriott Suffers Data Breach Impacting More Than 5 Million Customers
On Tuesday, March 31, hospitality company Marriott International disclosed information that it suffered a massive data breach. The number of...