• About
  • News
  • Contact
  • Support
  • Login
ThreatModeler
  • Products
    • Threatmodeler
    • CloudModeler
    • IaC-Assist
    • Patents
  • Industries
    • Health
    • Finance
    • Retail
  • Resources
    • Blog
    • White Papers
    • Webinars
    • Datasheets
    • Videos
    • Awards
    • Events
    • Cartoons
    • Intellectual Property
  • Live Demo
Select Page
Twitter Is the Latest Victim of a Rapidly-Growing Cybersecurity Threat: Insider Attacks

Twitter Is the Latest Victim of a Rapidly-Growing Cybersecurity Threat: Insider Attacks

by threatmodeler | Jul 29, 2020 | Attack Surface Analysis, DevSecOps, Insider Threats, Threat Modeling

Many in the cybersecurity world spend their entire careers trying to prevent the kind of high-profile, reputation-wrecking cyberattack such as what occurred to Twitter earlier this month. On July 15, Twitter users the world over were puzzled to read messages promoting...
Six Steps to Threat Modeling for Secure Data Assets

Six Steps to Threat Modeling for Secure Data Assets

by threatmodeler | Jul 22, 2020 | Attack Surface Analysis, DevSecOps, Threat Modeling Process

For software and application development teams, data assets represent the culmination of years, even decades, of iterative hard work towards building business value. If put into the wrong hands, compromised data assets may ruin client relationships, lead to even...
A Day In the Life of a Threat Research Engineer

A Day In the Life of a Threat Research Engineer

by threatmodeler | Jul 9, 2020 | Attack Surface Analysis, Cyber Risk, Uncategorized

With the COVID-19 pandemic impacting us worldwide and showing no signs of letting up, many cybersecurity professionals are working remotely, and taking extra measures to secure their devices and networks. We turn the spotlight on to the role of cybersecurity...

Tags

2020 cybersecurity 2020 elections Amazon Application Security application threat model application threat modeling attack surface analysis AWS AWS Security Epics Automated AWS Threat Modeling Blog CDLC Channel Futures CISO cloud computing cloud development life cycle Cloud Security collateral damage cybercrime cybersecurity Dark Reading data breach data breaches Data Security DevOps DevSecOps Dice Forbes internet of things IoT IoT Security one-click threat modeling PC Gamer Press Release ransomware Risk Management SC Magazine Security Boulevard security by design Security Magazine ThreatModeler Threat Modeling Threat Modeling Process Threat Post ZDNet

Latest Posts

  • Why Companies are Racing to Integrate Automated Threat Modeling into Their Workflows
  • How to Maximize Your Cybersecurity Budget With Threat Modeling
  • medical device
    Why Medical Devices Need to be Secured Right From Design
  • How to Strengthen Your Cloud Security with CloudModeler
  • ThreatModeler Announces New Patent for IaC-Assist

About ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s SDLC by identifying, predicting and defining threats, empowering security and DevOps teams to make proactive security decisions. ThreatModeler ™ provides a holistic view of the entire attack surface, enabling enterprises to minimize their overall risk.

Quick Links

  • Attack Surface
  • Automated Threat Modeling
  • Threat Modeling
  • Threat Modeling Methodologies
  • Threat Modeling Software
  • Threat Modeling Tools

Get in Touch

sales@threatmodeler.com
+1-201-266-0510
101 Hudson Street, Suite 2100
Jersey City NJ 07302

© 2022. All Rights Reserved.   Privacy Policy    |   Terms of Service