Nov 13, 2019 | Attack Surface Analysis, AWS, Cloud security
For the second year in a row, ThreatModeler will host a sponsored booth at the AWS re:Invent conference in Las Vegas. In an endeavor to build community and raise awareness about its product – including existing capabilities and new enhancements – ThreatModeler...
Nov 12, 2019 | API Security, Attack Surface Analysis
Application Programming Interfaces (APIs) contribute to a substantial amount of modern software application development. APIs are multidisciplinary, data driven and can be used for a number of applications, including microservices, web pages, mobile, the Internet of...
Oct 30, 2019 | Industrial Control System, IoT Cybersecurity, Security, Threat Models
Over the course of recent years, Internet of Things (IoT)-embedded technology has become more pervasive. IoT is finding its way into all of the major industries. From retail, to to critical infrastructure and everything in between, IoT devices are everywhere. They are...
Oct 29, 2019 | Attack Surface Analysis, Threat Modeling Process, Threat Modeling Tools
Process follow diagrams, also known as process flow charts, help organizations to map out business processes. Process flow diagrams are visual tools that help to explain certain processes that occur, oftentimes in sequential order. Process flow diagrams lend...
Oct 9, 2019 | Cloud security, Enterprise Threat Modeling, Threat Models
Telecom networks tie together and coordinate activity between other critical infrastructures, businesses, government agencies, and individuals. In our highly interconnected cyber ecosystem, virtually everyone relies on telecom networks for “always on” services.[1]...