• About
  • News
  • Contact
  • Support
  • Login
ThreatModeler
  • Products
    • Threatmodeler
    • CloudModeler
    • IaC-Assist
  • Industries
    • Health
    • Finance
    • Retail
  • Resources
    • Blog
    • White Papers
    • Webinars
    • Datasheets
    • Videos
    • Awards
    • Events
    • Cartoons
  • Live Demo
Select Page
As the Nation Turns to Zoom for Video-Teleconferencing, Security Issues Surface

As the Nation Turns to Zoom for Video-Teleconferencing, Security Issues Surface

by threatmodeler1 | Apr 7, 2020 | CISO, Enterprise Threat Modeling, Recent News, Risk Management, Security

Practically overnight, the nation’s populace went from normal, everyday routine to remote work to address the coronavirus pandemic. To stay in touch with coworkers, colleagues, friends and students, more people started relying on Zoom for video-teleconferencing (VTC)....
6 Best Security Practices for Remote Work During Coronavirus (COVID-19)

6 Best Security Practices for Remote Work During Coronavirus (COVID-19)

by threatmodeler1 | Mar 25, 2020 | Attack Surface Analysis, Cyber Risk, Risk Management, Security, Uncategorized

With cases of the fresh Coronavirus (COVID-19) happening in every single state, companies of all sizes are impacted. The pandemic is forcing many governments to postpone business in order to contain the virus and figure out next steps to combat COVID-19. It’s a sore...
Stalkerware Is a Dangerous Threat and Not a Lot Is Being Done About It

Stalkerware Is a Dangerous Threat and Not a Lot Is Being Done About It

by threatmodeler1 | Feb 25, 2020 | Attack Surface Analysis, Recent News, Security

Stalkerware is one of the most invasive forms of cybercrime and involves the use of spyware that is freely available on the market. Once installed on a device, stalkerware, in stealth mode, remains undetected. Here is where stalkerware earned its name and remains one...
Top 5 Password Attack Types and How to Prevent Them

Top 5 Password Attack Types and How to Prevent Them

by threatmodeler1 | Feb 13, 2020 | Attack Surface Analysis, Cloud security, DevOps, Risk Management, Security

Password security is no joke. It’s a security measure for the point of entry to personally identifiable information (PII), and confidential, sensitive information. The first thing anyone should know when creating an account is to never share their password....
Threat Modeling Important for Small-and-Midsize Business

Threat Modeling Important for Small-and-Midsize Business

by threatmodeler1 | Jan 30, 2020 | CISO, Cloud security, DevOps, DevOps Implementation, Threat Modeling

According to a 2019 study on the financial impacts of data breaches, small-to-midsize businesses (SMBs) are “acutely” affected, averaging $2.5 million for data breach remediation. According to the IBM Cost of a Data Breach report (conducted by the Ponemon Institute),...
« Older Entries
Next Entries »

Tags

2020 cybersecurity 2020 elections Amazon Application Security application threat model application threat modeling AWS AWS Security Epics Automated AWS Threat Modeling Blog CDLC Channel Futures CISO cloud computing cloud development life cycle Cloud Security collateral damage cybercrime cybersecurity Dark Reading data breach data breaches Data Security DevOps DevSecOps Dice Forbes internet of things IoT IoT Security one-click threat modeling PC Gamer Press Release ransomware Risk Management SC Magazine SCM Magazine Security Boulevard security by design Security Magazine ThreatModeler Threat Modeling Threat Modeling Process Threat Post ZDNet

Latest Posts

  • Hackers Cast LinkedIn as Most-Popular Phishing Spot
  • Gain Insight Into Your Attack Surface AND Compliance Requirements With Threat Modeling
  • SolarWinds Data Breach Lawsuit Takeaways for CISOs
  • Better Cybercrime Metrics Act Signed Into Law
  • 23 DevSecOps tools for baking security into the development process

About ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s SDLC by identifying, predicting and defining threats, empowering security and DevOps teams to make proactive security decisions. ThreatModeler ™ provides a holistic view of the entire attack surface, enabling enterprises to minimize their overall risk.

Quick Links

  • Attack Surface
  • Automated Threat Modeling
  • Threat Modeling
  • Threat Modeling Methodologies
  • Threat Modeling Software
  • Threat Modeling Tools

Get in Touch

sales@threatmodeler.com
+1-201-266-0510
101 Hudson Street, Suite 2100
Jersey City NJ 07302

© 2022. All Rights Reserved. Design by Tethos Creative.   |   Privacy Policy    |   Terms of Service