![7 Cybersecurity Podcasts You Should Listen to Now](https://threatmodeler.com/wp-content/uploads/2020/04/California-9.png)
![7 Cybersecurity Podcasts You Should Listen to Now](https://threatmodeler.com/wp-content/uploads/2020/04/California-9.png)
![Importance of Cybersecurity Reporting for CISOs](https://threatmodeler.com/wp-content/uploads/2020/03/California-1-1.png)
Importance of Cybersecurity Reporting for CISOs
With cybersecurity becoming a crucial part of a successful technology development life cycle, it cannot be stressed enough the significance of reporting. For CISOs, reporting is a crucial part of the puzzle, and provides a tangible way for development, security and...![Threat Modeling Important for Small-and-Midsize Business](https://threatmodeler.com/wp-content/uploads/2020/01/Copy-of-Copy-of-Untitled-2.png)
Threat Modeling Important for Small-and-Midsize Business
According to a 2019 study on the financial impacts of data breaches, small-to-midsize businesses (SMBs) are “acutely” affected, averaging $2.5 million for data breach remediation. According to the IBM Cost of a Data Breach report (conducted by the Ponemon Institute),...![Architecturally-Based Process Flow Diagrams: Examples and Tips to Follow](https://threatmodeler.com/wp-content/uploads/2020/01/Copy-of-Untitled-5.png)
Architecturally-Based Process Flow Diagrams: Examples and Tips to Follow
Threat modeling is catching on. Increasingly, organizations are coming to the realization that securing DevOps projects as early as possible – preferably during the initial whiteboard planning and design stages – not only reduces risk, it makes good business sense....![Application Threat Modeling: Guide for CISOs](https://threatmodeler.com/wp-content/uploads/2020/01/Copy-of-Untitled-3.png)