Apr 26, 2024 | Cyber Risk, Security, Threat Modeling
Secure Your Supply Chain in 2024: Identifying Third-Party Vendor Risks With Threat Modeling In this blog post, we will discuss how to strengthen your supply chain by leveraging the threat modeling process to identify threats from third-party vendors and secure them....
Aug 10, 2022 | Blog, Security, Threat Modeling, Threat Modeling Software, ThreatModeler
There’s a difference between building a threat model and creating a threat modeling culture. To be sure one is part of the other, but to understand the difference requires an analogy. Imagine threat modeling as bodybuilding. Building a threat model would be your...
Jun 22, 2022 | Blog, Cyber Risk, Security, Threat Modeling
Everyone who is familiar with threat modeling knows that threat modeling is used to model threats in software applications. And if that’s all threat modeling did, it would still be really useful. But threat modeling can do something just as important. It can tell you...
Jun 8, 2022 | Blog, Cloud security, Cloud Threat Modeling, Enterprise Threat Modeling, Security
Cloud cybersecurity using threat modeling is a proactive approach that identifies potential threats and suggests preventive measures before deployment in the dynamic and virtual cloud environment. This method transforms cybersecurity from being reactive to proactive,...
May 8, 2022 | Enterprise Threat Modeling, Security, Threat Models
Financial institutions are consistently in the top-five list of cyber attack targets, with the greatest increase in data breach risk coming from outside hackers.[1] Customer financial records and associated personally identifying information are high-value commodities...
Dec 10, 2020 | Attack Surface Analysis, CISO, Cyber Risk, DevOps, Enterprise Threat Modeling, Risk Management, Security, SOAR
This is an excerpt from a panel we participated in at the NY Cyber Security Summit. You can check out the entire panel below: https://www.youtube.com/watch?v=HMerd-BKaYc&list=PLUJfsMmlclPSfFtn2yYGPI-4jq_NA40aJ&index=6 Security Orchestration Automation Response...