Apr 4, 2022 | Recent News
Policy-driven security makes perfect sense. You’re developing a secure system and you have some compliance requirements it must meet. You start by translating those requirements into a series of security policies with which your system must comply. You then cut loose...
Mar 30, 2022 | Press Release, Recent News
Cyber aggression accusations in hybrid war. Spam texts from your own number. Aviation DDoS incidents. ICS security advisories. Read the full article here If you’d like to learn more about ThreatModeler’s capabilities, you can contact us here.
Mar 28, 2022 | Recent News
Infrastructure as Code (IaC) sure is convenient. IaC is a way for DevOps teams to deploy and manage application environments through a model, rather than having to do it manually. And there sure are lots of benefits to deploying infrastructure that way. Benefits...
Mar 21, 2022 | Recent News
It seems that just about every application resides in the cloud today. There’s little doubt that these cloud infrastructures need cloud security. But cloud infrastructures are dynamic—they change continuously. So, how do you protect something that’s constantly...
Mar 14, 2022 | Recent News
As threat modeling becomes an integral part of application development, it is interesting to take a look back on its evolution. Here we see that its development represents a continuum from do-it-yourself to one-click threat modeling (almost). Microsoft STRIDE...
Mar 8, 2022 | Recent News
As we detailed in our last post, cars are essentially computers on wheels. And there will soon be a lot of these connected vehicles. According to Juniper Research, by 2025 there will be 206 million automobiles with embedded connectivity, 30 million of which will be...