Sep 6, 2022 | Recent News
There was a time, not too long ago, when the only things connected to IT networks were IT devices. You know, computers and such. But that’s not true anymore. Today, it seems like everything is connected to IT networks, including most devices which are part of an...
Aug 30, 2022 | Threat Modeling Process
Cyber burnout is a real thing. What it is? What exactly is cyber burnout or cyber fatigue? According to Stacy Thayer, speaking at blackhat 2022, “Occupational burnout is clinically defined as a psychological syndrome that occurs due to chronic emotional interpersonal...
Aug 23, 2022 | Threat Modeling Process
Threat modeling actually goes back further than you might think. Depending on what you choose as the starting point for the first threat model, you can trace it back to the 70s, 80s or 90s. Regardless of the particular starting point, one thing is for sure. From that...
Aug 10, 2022 | Security, Threat Modeling, Threat Modeling Software, ThreatModeler
There’s a difference between building a threat model and creating a threat modeling culture. To be sure one is part of the other, but to understand the difference requires an analogy. Imagine threat modeling as bodybuilding. Building a threat model would be your...
Jul 26, 2022 | DevSecOps, Threat Modeling
Like everything else in the world of cybersecurity, threat modeling tools and practices continue to evolve. How is threat modeling evolving? There are five areas where we will continue to see improvement in the future. These are 1) collaboration; 2) ease of use; 3)...