![AWS re:Invent: It’s Not Too Late to Attend](https://threatmodeler.com/wp-content/uploads/2021/11/AWS-re-Invent-Its-Not-Too-Late-to-Attend.jpg)
![AWS re:Invent: It’s Not Too Late to Attend](https://threatmodeler.com/wp-content/uploads/2021/11/AWS-re-Invent-Its-Not-Too-Late-to-Attend.jpg)
![Don’t Overlook This Booth #1626 at AWS Reinvent](https://threatmodeler.com/wp-content/uploads/2021/11/Dont-Overlook-This-Booth-1626-at-AWS-Reinvent-1.jpg)
Don’t Overlook This Booth #1626 at AWS Reinvent
Are you heading over to AWS Reinvent in Las Vegas, November 29 – December 3, 2021? If so, then there’s a booth you’re going to want to visit, especially if migrating to the cloud is in your future. But first, you have to understand why. The Curious Case of Cloud...![Does Your Threat Modeling Tool Have This Essential Capability](https://threatmodeler.com/wp-content/uploads/2021/11/Does-Your-Threat-Modeling-Tool-Have-This-Essential-Capability.jpg)
Does Your Threat Modeling Tool Have This Essential Capability
Until very recently, threat modeling was strictly a proactive technique to identify and mitigate potential threats in an application. Creating the threat model was something you did during development and before you launched the application. It had a very “fire and...![Can Threat Modeling Actually Help With Data Governance Too?](https://threatmodeler.com/wp-content/uploads/2021/10/Can-Threat-Modeling-Actually-Help-With-Data-Governance-Too.jpg)
Can Threat Modeling Actually Help With Data Governance Too?
When you think about using a threat modeling tool in DevOps or DevSecOps, you think about modeling threats in an effort to make your application secure. You may even think about using a threat modeling tool to ensure your application meets some compliance...![A Surprising Capability of Threat Modeling in Software Development](https://threatmodeler.com/wp-content/uploads/2021/10/A-Surprising-Capability-of-Threat-Modeling-in-Software-Development.jpg)