Where are You in Your Threat Modeling Journey?

Where are You in Your Threat Modeling Journey?

We like to say that to do it right, threat modeling cannot be a one-time project. Your threat modeling journey must be an ongoing process. In that same way, if you do it right, threat modeling won’t be a destination, it will be a journey. An evolutionary journey....
6 Steps to Threat Model with Infrastructure as Code

6 Steps to Threat Model with Infrastructure as Code

When doing Infrastructure as Code (IaC), threat modeling is crucial for identifying and addressing potential security risks. Here are some key steps to threat model effectively: Define Scope and Assets: Identify the assets to protect, such as data, systems, networks,...
ThreatModeler Launched IaC-Assist 2.0

ThreatModeler Launched IaC-Assist 2.0

ThreatModeler© announced the launch of IaC-Assist 2.0, an integrated development environment (IDE) that secures infrastructure-as-code (IaC) at the development stage to ensure deployments are secure by design. Read more...
ThreatModeler Releases IaC-Assist 2.0

ThreatModeler Releases IaC-Assist 2.0

ThreatModeler announced the launch of IaC-Assist 2.0, an integrated development environment (IDE) that secures infrastructure-as-code (IaC) at the development stage to ensure deployments are secure by design. Read more...