Aug 24, 2023 | API Security, DevSecOps, Threat Modeling
There was a time when developing secure code was just a good idea. Now, in many instances, it’s a requirement. But how do you know if a developer is developing secure code? The key here is knowing it’s secure.There are actually two aspects to developing secure code....
Aug 17, 2023 | Recent News
Everyone is a fan of agile development. And while there are many benefits to adopting an agile methodology, one of the most important is that it speeds up software development. “Oftentimes products developed according to agile methodologies do end up getting shipped...
Jul 27, 2023 | Recent News
When doing Infrastructure as Code (IaC), threat modeling is crucial for identifying and addressing potential security risks. Here are some key steps to threat model effectively: Define Scope and Assets: Identify the assets to protect, such as data, systems, networks,...
Jul 13, 2023 | Recent News
Organizations are starting to warm up to the idea that they need to implement threat modeling. After all, it’s not just good business, but in many cases, it’s mandatory. For example, there are now many regulatory bodies that mandate threat modeling. These include in...
May 4, 2023 | Recent News
Threat modeling for healthcare organizations involves systematically identifying, assessing, and addressing potential security risks associated with the storage and transmission of sensitive patient data. This proactive approach helps to protect digital health...