Oct 1, 2019 | Attack Surface Analysis, DevSecOps, Threat Modeling Process, Threat Modeling Tools
Within the context of information security, application threat modeling seeks to identify, understand and communicate threat information to security decision makers. Threat modeling can be used to secure system networks, applications, mobile, web, Internet of Things...
Sep 26, 2019 | Attack Surface Analysis, CISO, DevSecOps, Events, Methodology, Threat Modeling Process
On Friday, September 20, 2019, the Cyber Tech Accord invited ThreatModeler to speak on its panel appearing at the 2nd Annual Cybersecurity Summit. Alex Bauert, CISSP, CSSLP – ThreatModeler’s Senior Director of Threat Research – sat alongside esteemed Tech Accord panel...
Aug 7, 2019 | IoT Cybersecurity, Methodology, Security, Threat Modeling, Threat Modeling Process, Threat Models, ThreatModeler
Internet of Things (IoT) solutions are trending at an explosive rate, especially in the business world. With an exponential increase in devices that connect to the internet, businesses see huge benefits for communications and productivity. However, this can also leave...
Jan 16, 2019 | IoT Cybersecurity
A new year comes with new challenges. It is a time of deliberation and preparation for organizations across all industries and divisions. One of the most impactful industries in 2018 was cybersecurity, and this year is no different. Investments in technology continue...
Oct 22, 2018 | Threat Modeling
As sensitive or critical data becomes more valuable and prone to theft or hacks, enterprise cybersecurity protocols such as threat modeling as part of a mitigation strategy become more critical. Even the world’s premier technology companies like Facebook are subject...