Can You Code Your Way to Cybersecurity?

Can You Code Your Way to Cybersecurity?

Back in 2011, Marc Andreessen wrote an article entitled Why Software is Eating the World. His theory was that software could replace a lot of traditional businesses (and as things turned out he was right). What is it about coding something in software that makes it so...
Where are You in Your Threat Modeling Journey?

Where are You in Your Threat Modeling Journey?

We like to say that to do it right, threat modeling cannot be a one-time project. It must be an ongoing process. In that same way, if you do it right, threat modeling won’t be a destination, it will be a journey. An evolutionary journey. Whether you’re just getting...
Why You Should do Threat Modeling to Protect Your APIs

Why You Should do Threat Modeling to Protect Your APIs

When it comes to protecting your attack surface, there’s hardly anything more challenging than APIs. After all, APIs are your way of granting public access to data you’re responsible for protecting. And if you’re going to have a public-facing door to your data, you’d...
A Quick Overview of When to Threat Model

A Quick Overview of When to Threat Model

It’s easy to think of threat modeling as something developers do during the DevOps process to ensure a safe application. And that’s certainly true. To that end, threat modeling is something you do when developing an application. But that’s not the only time you should...