Differentiating Compliance and Security for AWS Development

Differentiating Compliance and Security for AWS Development

How Security and Compliance Teams Can Collaborate and Thrive in the Cloud Compliance and security share a great deal in common, but there are key differences. Both deal with organizational safety and security, minimize risk, protect consumer data, and experience...
Top 10 Cybersecurity Predictions for 2020

Top 10 Cybersecurity Predictions for 2020

We are leaving behind a year that, statistically, was higher than average in cyberattacks and data breaches. As we near the end of 2019, we can look toward a new year that can bring many expectations in the continuing cybersecurity war. When it comes to cybersecurity,...
How Much Will a Cybersecurity Penetration Test Cost?

How Much Will a Cybersecurity Penetration Test Cost?

Here at ThreatModeler, we believe that everyone – from personal consumers to workers within business functions at an organization – are consumers of software. As the software landscape continues to evolve with technology advancements, hackers are finding new ways and...
Designing for Security With Threat Modeling

Designing for Security With Threat Modeling

Within the context of information security, application threat modeling seeks to identify, understand and communicate threat information to security decision makers. Threat modeling can be used to secure system networks, applications, mobile, web, Internet of Things...
ThreatModeler at BlackHat 2019 Cybersecurity Conference

ThreatModeler at BlackHat 2019 Cybersecurity Conference

Now in its 22nd year, BlackHat 2019 took place on August 7 and 8 at the Mandalay Bay Convention Center in Las Vegas, Nevada. Joining cyber security experts, hackers, researchers, and vendors, ThreatModeler management attended in full force. This was the first year...