• About
  • News
  • Contact
  • Support
  • Login
ThreatModeler
  • Products
    • Threatmodeler
    • CloudModeler
    • IaC-Assist
  • Industries
    • Health
    • Finance
    • Retail
  • Resources
    • Blog
    • White Papers
    • Webinars
    • Datasheets
    • Videos
    • Awards
    • Events
    • Cartoons
  • Live Demo
Select Page
Why Cybersecurity Must Be a Priority in Education at All Levels

Why Cybersecurity Must Be a Priority in Education at All Levels

by threatmodeler1 | Feb 26, 2020 | Cloud security, Recent News, Security

Technology is all around us. From our homes, schools, businesses – even in transit. We rely on technology to ensure, for example that critical infrastructure is provided so we can lead healthy, productive and safe lives. Technology continues to advance, but with new...
With the Right Threat Modeling Tool, You Can Save Millions of Dollars

With the Right Threat Modeling Tool, You Can Save Millions of Dollars

by threatmodeler1 | Feb 19, 2020 | Cloud security, IoT Cybersecurity, Risk Management, Security

Nowadays, data breaches are a grim reality and a party of the daily grind for organizations – no matter what sector or size. Enterprises are exposed to hackers and malicious insiders daily. As ubiquitous as they are today, threats and vulnerabilities are only...
Threat Modeling Important for Small-and-Midsize Business

Threat Modeling Important for Small-and-Midsize Business

by threatmodeler1 | Jan 30, 2020 | CISO, Cloud security, DevOps, DevOps Implementation, Threat Modeling

According to a 2019 study on the financial impacts of data breaches, small-to-midsize businesses (SMBs) are “acutely” affected, averaging $2.5 million for data breach remediation. According to the IBM Cost of a Data Breach report (conducted by the Ponemon Institute),...
Application Threat Modeling: Guide for CISOs

Application Threat Modeling: Guide for CISOs

by threatmodeler1 | Jan 20, 2020 | CISO, DevOps, DevSecOps, Enterprise DevSecOps, Enterprise Threat Modeling, Threat Modeling

Application Threat modeling is a structured and methodical approach that allows you to identify potential threats to applications, classify them by risk, and prioritize mitigation efforts. CISOs and other senior leaders leverage threat model ouput to drive decision...
5 Things to Do Before You Threat Model

5 Things to Do Before You Threat Model

by threatmodeler1 | Jan 14, 2020 | Cyber Risk, Threat Modeling, Threat Models

Threat modeling is vital for businesses trying to become proactive and deliberate in SDLC and CDLC with adequate application security. Security teams have started the new year planning ahead and discussing potential security risks to their organizations. To secure...
« Older Entries
Next Entries »

Tags

2020 cybersecurity 2020 elections Amazon Application Security application threat model application threat modeling AWS AWS Security Epics Automated AWS Threat Modeling Blog CDLC Channel Futures CISO cloud computing cloud development life cycle Cloud Security collateral damage cybercrime cybersecurity Dark Reading data breach data breaches Data Security DevOps DevSecOps Dice Forbes internet of things IoT IoT Security one-click threat modeling PC Gamer Press Release ransomware Risk Management SC Magazine SCM Magazine Security Boulevard security by design Security Magazine ThreatModeler Threat Modeling Threat Modeling Process Threat Post ZDNet

Latest Posts

  • Hackers Cast LinkedIn as Most-Popular Phishing Spot
  • Gain Insight Into Your Attack Surface AND Compliance Requirements With Threat Modeling
  • SolarWinds Data Breach Lawsuit Takeaways for CISOs
  • Better Cybercrime Metrics Act Signed Into Law
  • 23 DevSecOps tools for baking security into the development process

About ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s SDLC by identifying, predicting and defining threats, empowering security and DevOps teams to make proactive security decisions. ThreatModeler ™ provides a holistic view of the entire attack surface, enabling enterprises to minimize their overall risk.

Quick Links

  • Attack Surface
  • Automated Threat Modeling
  • Threat Modeling
  • Threat Modeling Methodologies
  • Threat Modeling Software
  • Threat Modeling Tools

Get in Touch

sales@threatmodeler.com
+1-201-266-0510
101 Hudson Street, Suite 2100
Jersey City NJ 07302

© 2022. All Rights Reserved. Design by Tethos Creative.   |   Privacy Policy    |   Terms of Service