News
Can Threat Modeling Actually Improve Incident Response?
You threat model to identify threats and implement mitigations before you deploy an application. In this regard, the overarching reason for your...
Whitepaper: What’s Needed to Turn DevOps into DevSecOps
DevOps is a natural byproduct of the shift to agile software development and the move to the cloud. One of the main benefits of DevOps is the speed...
Cyber Insights 2023 | The Coming of Web3
Web3 is a term that has been hijacked for marketing purposes. Since web3 obviously represents the future internet, claiming to be web3 now is a...
How to Maximize the Impact of Your Threat Modeling: An Overview of the ThreatModeler Community Resources
If you’re a first-time threat modeler, threat modeling can seem overwhelming. Maybe you’re following one of the common threat modeling frameworks...
Seven Common Misconceptions About Threat Modeling
There is general consensus in the DevSecOps community that threat modeling is a good thing. The sooner in the application development cycle you find...
Manufactured Disruption: Securing Cyber-Physical Systems
Cyber-physical systems, which combine computing, networking, and physical components to perform tasks in the real world, have become essential in...
An Overlooked Reason Why There are so Many Data Breaches
Take a look at the headlines in any security news outlet and one thing really stands out. There are data breaches everywhere. That happen all the...
Are Your Threat Models Ready for Q-Day?
Threat models are really good at identifying and mitigating cybersecurity threats. But they’re not much good at addressing threats nobody knows...
Threat-Modeling Pioneer Enables Collaborative Platform for Real-Time Cloud Security Modeling
Stevie-winner ThreatModeler™ is a collaborative platform where security experts or non-security professionals alike can visualize design flaws...