Secure Supply Chain 2024: Threat Modeling Vendor Risks

Secure Supply Chain 2024: Threat Modeling Vendor Risks

Secure Your Supply Chain in 2024: Identifying Third-Party Vendor Risks With Threat Modeling In this blog post, we will discuss how to strengthen your supply chain by leveraging the threat modeling process to identify threats from third-party vendors and secure them....
Why it’s Important to Build a Threat Modeling Culture

Why it’s Important to Build a Threat Modeling Culture

There’s a difference between building a threat model and creating a threat modeling culture. To be sure one is part of the other, but to understand the difference requires an analogy. Imagine threat modeling as bodybuilding. Building a threat model would be your...
How to Maximize Your Cybersecurity Budget With Threat Modeling

How to Maximize Your Cybersecurity Budget With Threat Modeling

Everyone who is familiar with threat modeling knows that threat modeling is used to model threats in software applications. And if that’s all threat modeling did, it would still be really useful. But threat modeling can do something just as important. It can tell you...
Secure Online Banking

Secure Online Banking

Financial institutions are consistently in the top-five list of cyber attack targets, with the greatest increase in data breach risk coming from outside hackers.[1] Customer financial records and associated personally identifying information are high-value commodities...
What is SOAR and How Does It Help Secure Enterprises?

What is SOAR and How Does It Help Secure Enterprises?

This is an excerpt from a panel we participated in at the NY Cyber Security Summit. You can check out the entire panel below: https://www.youtube.com/watch?v=HMerd-BKaYc&list=PLUJfsMmlclPSfFtn2yYGPI-4jq_NA40aJ&index=6 Security Orchestration Automation Response...