Do You Want Easy Threat Models or Effective Threat Models?

Do You Want Easy Threat Models or Effective Threat Models?

Imagine you’re a developer in the middle of your current two-week sprint. You’re under a lot of pressure and working long days when the application architect tells you that you need to threat model your design. You may not have a lot of threat modeling experience. At...
ThreatModeler Releases New Partner Program

ThreatModeler Releases New Partner Program

ThreatModeler, a leader in threat modeling and securing cloud infrastructure from design to deployment, announced the launch of its ThreatNet Partner Program, which is designed to help partners capitalize on the growing demand for the DevSecOps solutions their...
Why You Should do Threat Modeling to Protect Your APIs

Why You Should do Threat Modeling to Protect Your APIs

When it comes to protecting your attack surface, there’s hardly anything more challenging than APIs. After all, APIs are your way of granting public access to data you’re responsible for protecting. And if you’re going to have a public-facing door to your data, you’d...
Threat Modeling for Critical Infrastructure

Threat Modeling for Critical Infrastructure

It’s not surprising that we have to protect our critical infrastructure from cyberattacks. What might be a surprise is what all constitutes critical infrastructure. There are actually 16 sectors where the United States government has set up critical infrastructure...