Jun 4, 2020 | AWS, AWS Security Epics Automated, Cloud security, Security
How Security and Compliance Teams Can Collaborate and Thrive in the Cloud Compliance and security share a great deal in common, but there are key differences. Both deal with organizational safety and security, minimize risk, protect consumer data, and experience...
Dec 10, 2019 | Cyber Risk, Security
We are leaving behind a year that, statistically, was higher than average in cyberattacks and data breaches. As we near the end of 2019, we can look toward a new year that can bring many expectations in the continuing cybersecurity war. When it comes to cybersecurity,...
Oct 22, 2019 | Attack Surface Analysis, DevSecOps, Threat Modeling as a Service
Here at ThreatModeler, we believe that everyone – from personal consumers to workers within business functions at an organization – are consumers of software. As the software landscape continues to evolve with technology advancements, hackers are finding new ways and...
Oct 1, 2019 | Attack Surface Analysis, DevSecOps, Threat Modeling Process, Threat Modeling Tools
Within the context of information security, application threat modeling seeks to identify, understand and communicate threat information to security decision makers. Threat modeling can be used to secure system networks, applications, mobile, web, Internet of Things...
Aug 27, 2019 | Cloud security, Events, IoT Cybersecurity, Security, Threat Modeling Software
Now in its 22nd year, BlackHat 2019 took place on August 7 and 8 at the Mandalay Bay Convention Center in Las Vegas, Nevada. Joining cyber security experts, hackers, researchers, and vendors, ThreatModeler management attended in full force. This was the first year...