Threat Modeling for Telecom Companies

Threat Modeling for Telecom Companies

In many ways, telecom companies are no different than other companies when it comes to cybersecurity. They’re potential targets because they handle sensitive and valuable data. However, telecom companies are in a class by themselves when it comes to defending...
The Two Features You Must Have in Your Threat Modeling Tool

The Two Features You Must Have in Your Threat Modeling Tool

More and more, companies are recognizing the importance of threat modeling. With all the cyber threats, and the increase in regulatory requirements, a formal threat modeling process is a must have for many companies today. Once an organization gets onboard with threat...
Do You Want Easy Threat Models or Effective Threat Models?

Do You Want Easy Threat Models or Effective Threat Models?

Imagine you’re a developer in the middle of your current two-week sprint. You’re under a lot of pressure and working long days when the application architect tells you that you need to threat model your design. You may not have a lot of threat modeling experience. At...
Why You Should do Threat Modeling to Protect Your APIs

Why You Should do Threat Modeling to Protect Your APIs

When it comes to protecting your attack surface, there’s hardly anything more challenging than APIs. After all, APIs are your way of granting public access to data you’re responsible for protecting. And if you’re going to have a public-facing door to your data, you’d...