• About
  • News
  • Contact
  • Support
  • Login
ThreatModeler
  • Products
    • Threatmodeler
    • CloudModeler
    • IaC-Assist
    • Patents
  • Industries
    • Health
    • Finance
    • Retail
  • Resources
    • Blog
    • White Papers
    • Webinars
    • Datasheets
    • Videos
    • Awards
    • Events
    • Cartoons
    • Intellectual Property
  • Live Demo
Select Page
Six Steps to Threat Modeling for Secure Data Assets

Six Steps to Threat Modeling for Secure Data Assets

by threatmodeler | Jul 22, 2020 | Attack Surface Analysis, DevSecOps, Threat Modeling Process

For software and application development teams, data assets represent the culmination of years, even decades, of iterative hard work towards building business value. If put into the wrong hands, compromised data assets may ruin client relationships, lead to even...
Threat Modeling: Are Data Flow Diagrams Enough?

Threat Modeling: Are Data Flow Diagrams Enough?

by threatmodeler | Jun 8, 2020 | AWS Security Epics Automated, Cyber Risk, Threat Modeling, Threat Modeling Process

By Stuart Winter-Tear, Director of Sales Engineering, ThreatModeler Software, Inc. As part of the 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), a paper was reviewed and accepted entitled: “Security Threat Modeling: Are...

Tags

2020 cybersecurity 2020 elections Amazon Application Security application threat model application threat modeling attack surface analysis AWS AWS Security Epics Automated AWS Threat Modeling Blog CDLC Channel Futures CISO cloud computing cloud development life cycle Cloud Security collateral damage cybercrime cybersecurity Dark Reading data breach data breaches Data Security DevOps DevSecOps Dice Forbes internet of things IoT IoT Security one-click threat modeling PC Gamer Press Release ransomware Risk Management SC Magazine Security Boulevard security by design Security Magazine ThreatModeler Threat Modeling Threat Modeling Process Threat Post ZDNet

Latest Posts

  • Why Companies are Racing to Integrate Automated Threat Modeling into Their Workflows
  • How to Maximize Your Cybersecurity Budget With Threat Modeling
  • medical device
    Why Medical Devices Need to be Secured Right From Design
  • How to Strengthen Your Cloud Security with CloudModeler
  • ThreatModeler Announces New Patent for IaC-Assist

About ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s SDLC by identifying, predicting and defining threats, empowering security and DevOps teams to make proactive security decisions. ThreatModeler ™ provides a holistic view of the entire attack surface, enabling enterprises to minimize their overall risk.

Quick Links

  • Attack Surface
  • Automated Threat Modeling
  • Threat Modeling
  • Threat Modeling Methodologies
  • Threat Modeling Software
  • Threat Modeling Tools

Get in Touch

sales@threatmodeler.com
+1-201-266-0510
101 Hudson Street, Suite 2100
Jersey City NJ 07302

© 2022. All Rights Reserved.   Privacy Policy    |   Terms of Service