by threatmodeler1 | Jan 31, 2022 | Press
Track the Data Tom Garrubba, a vice president at Shared Assessments, says privacy is specifically focused on what an organization is permitted to do with the data it collects from a data subject. With that in mind, it’s important for companies to “follow the data,” he...
by threatmodeler1 | Jan 25, 2022 | Press
Question: How does threat modeling work in software development? Archie Agarwal, founder and CEO, ThreatModeler: Threat modeling is the process of identifying potential threats and taking action to prevent them. We all do this in some form, from buying a better lock...
by threatmodeler1 | Oct 1, 2021 | Press
When a team of hackers believed to be from the US and Israel deployed the Stuxnet worm in 2010 to sabotage centrifuges at an Iranian uranium-enrichment facility in Natanz, one critical vulnerability they exploited in the attack was a flaw in Windows Print Spooler....