A Cybersecurity Checklist for the New Year

A Cybersecurity Checklist for the New Year

When it comes to a cybersecurity checklist, admittedly you could have just a single item on your list: Identify your risks and mitigate them. In some ways, it really is that simple. And it applies to processes as well as technology. As an example, take a corporate...
Are You Ready for These 2022 Cyber Threats?

Are You Ready for These 2022 Cyber Threats?

A new year, a new set of cyber threats. Are you prepared? The only thing we know for sure is that cybercriminals will never stop. In this article, we’ll briefly summarize some predictions for security threats for the coming year and one thing you can do to prepare....
Where to do Threat Modeling in a CI/CD Pipeline?

Where to do Threat Modeling in a CI/CD Pipeline?

When it comes to developing software, everyone pretty much agrees it’s a good idea to know where the vulnerabilities are in the software BEFORE you deploy it. And using threat modeling is certainly a good option for identifying those vulnerabilities. In the years...
AWS: reInvent 2021 – Highlights and Some Help

AWS: reInvent 2021 – Highlights and Some Help

Now that AWS: reInvent 2021 in Las Vegas has wrapped up, it’s time to look back and see what the highlights were. What were the top stories? The #1 Story at AWS:reInvent There were plenty of stories at the show. From improved processors (i.e., Graviton 3), to IoT...

ThreatModeler

ThreatModeler revolutionizes threat modeling during the design phase by automatically analyzing potential attack surfaces. Harness our patented functionalities to make critical architectural decisions and fortify your security posture.

Learn more >

CloudModeler

Threat modeling remains essential even after deploying workloads, given the constantly evolving landscape of cloud development and digital transformation. CloudModeler not only connects to your live cloud environment but also accurately represents the current state, enabling precise modeling of your future state

Learn more >

IaC-Assist

DevOps Engineers can reclaim a full (security-driven) sprint with IAC-Assist, which streamlines the implementation of vital security policies by automatically generating threat models through its intuitive designer.

Learn more >