Where are You in Your Threat Modeling Journey?

Where are You in Your Threat Modeling Journey?

We like to say that to do it right, threat modeling cannot be a one-time project. Your threat modeling journey must be an ongoing process. In that same way, if you do it right, threat modeling won’t be a destination, it will be a journey. An evolutionary journey....
6 Steps to Threat Model with Infrastructure as Code

6 Steps to Threat Model with Infrastructure as Code

When doing Infrastructure as Code (IaC), threat modeling is crucial for identifying and addressing potential security risks. Here are some key steps to threat model effectively: Define Scope and Assets: Identify the assets to protect, such as data, systems, networks,...
The One Thing That Can Make Your Threat Modeling Easy

The One Thing That Can Make Your Threat Modeling Easy

Companies are starting to recognize the value (and requirements) of doing threat models for their applications and cloud infrastructure. And yet adoption of threat modeling as an organization-wide practice may be lower than expected. Why is that? To some extent,...
Five Things to Look for in a Threat Modeling Tool

Five Things to Look for in a Threat Modeling Tool

Organizations are starting to warm up to the idea that they need to implement threat modeling. After all, it’s not just good business, but in many cases, it’s mandatory. For example, there are now many regulatory bodies that mandate threat modeling. These include in...
Threat Modeling for Telecom Companies

Threat Modeling for Telecom Companies

In many ways, telecom companies are no different than other companies when it comes to cybersecurity. They’re potential targets because they handle sensitive and valuable data. However, telecom companies are in a class by themselves when it comes to defending...