Is This the Missing Piece to Widespread Threat Modeling Adoption?

Is This the Missing Piece to Widespread Threat Modeling Adoption?

Threat modeling is an effective process for identifying and prioritizing threats and recommending mitigations for software-based systems. In a world with so many cyber threats, that’s not a bad thing. So, why hasn’t threat modeling been more widely adopted? And is a...
The Most Important Part of Cybersecurity Requires no Cybersecurity Products

The Most Important Part of Cybersecurity Requires no Cybersecurity Products

It’s tempting to look for your cybersecurity solutions at a cybersecurity tradeshow. After all, that’s where all the latest and greatest cybersecurity products are on display. You just walk around, listen to the marketing pitches and choose the best products. There...
Why You’re Spending a Ton of Money on Cybersecurity and Still Getting Hacked

Why You’re Spending a Ton of Money on Cybersecurity and Still Getting Hacked

Why are you spending a lot of money on cybersecurity and still getting hacked? Because you’re spending too much money on the wrong thing. And what is that wrong thing? Defect discovery. Too Much Money on the Wrong Thing Whether you’re developing your own application,...
The Utter Futility of Trying to Combat Cyber Threats Reactively

The Utter Futility of Trying to Combat Cyber Threats Reactively

Say what you will about cyber attackers. They are persistent, they are clever and there are a lot of them. Case in point. The National Vulnerability Database catalogs Common Vulnerabilities and Exposures (CVE). The CVE system “provides a reference-method for publicly...
A Key Factor in Threat Modeling Success: Research

A Key Factor in Threat Modeling Success: Research

If there’s one thing that’s a given in the world of cybersecurity, it’s that change is constant. Consequently, any tools or techniques you use that remain unchanged will not be very effective at thwarting cyber threats. If you’re committed to a strong cyber posture,...