Oct 22, 2019 | Attack Surface Analysis, DevSecOps, Threat Modeling as a Service
Here at ThreatModeler, we believe that everyone – from personal consumers to workers within business functions at an organization – are consumers of software. As the software landscape continues to evolve with technology advancements, hackers are finding new ways and...
Sep 26, 2019 | Attack Surface Analysis, CISO, DevSecOps, Events, Methodology, Threat Modeling Process
On Friday, September 20, 2019, the Cyber Tech Accord invited ThreatModeler to speak on its panel appearing at the 2nd Annual Cybersecurity Summit. Alex Bauert, CISSP, CSSLP – ThreatModeler’s Senior Director of Threat Research – sat alongside esteemed Tech Accord panel...
Sep 18, 2019 | Cloud security, Cloud Threat Modeling, DevSecOps, Enterprise DevSecOps, Enterprise Threat Modeling
Increasingly, the financial services industry is migrating to the cloud for their content storage needs. Cloud storage occurs in physical storage and can be stored in private, public or hybrid facilities. But before we get detail in the nuances and strategic...
Sep 11, 2019 | Endoint Security, Industrial Control System, IoT Cybersecurity
A universal asynchronous receiver/transmitter (UART) is a hardware device with circuitry that facilitates communication between parallel and serial interfaces. These interfaces transmit data, as a single stream of bits, between two systems. Parallel and serial...