News
A Quick Overview of When to Threat Model
It’s easy to think of threat modeling as something developers do during the DevOps process to ensure a safe application. And that’s certainly true....
RSA Conference 2023 product preview
Keeping an organization secure against cyber threats necessitates a combination of employee training, security processes and tools to bolster...
Threat Modeling is not the Same as Threat Mapping
There’s a belief in the security community that if you’re doing threat mapping, you don’t need to do threat modeling. The idea is that threat...
vCISO: A Cybersecurity Leadership Career Path for Tech Pros
Cybersecurity is a multi-faceted problem that challenges every enterprise, large or small. There are critical vulnerabilities in software and...
Don’t Let Failing Banks Distract You from Cyber Threats
Human beings and organizations suffer from a cognitive condition known as recency bias. Recency bias “is a cognitive bias that favors recent events...
Does the New National Cybersecurity Strategy Make Threat Modeling Essential?
Are you aware of the National Cybersecurity Strategy announced by the Biden-Harris administration on March 2, 2023? Well, if you develop software,...
How DevSecOps Can Increase Confidence In Security Architecture
Proliferating threats and increasingly complex IT architectures are putting significant pressure on teams to keep their enterprise systems secure....
How Threat Modeling Can Help Minimize Your Application’s Blast Radius
Any piece of code can have a vulnerability. Whether application code or infrastructure code, errors, oversights and misconfigurations happen. The...
CI/CD: Necessary for modern software development, yet it carries a lot of risk
CI/CD over the past decade has become the cornerstone of modern software development. The term – for continuous integration and continuous delivery...