DevSecOps & Automated Threat Modeling for Federal Agencies

DevSecOps & Automated Threat Modeling for Federal Agencies

ThreatModeler has seen a significant uptick in US federal government agencies and contractors approaching us to find out more about automating the labor intensive manual process of threat modeling. Those charged with proactively managing NIST 800-53 Rev. 5...
Advantages of Modular Threat Modeling

Advantages of Modular Threat Modeling

Architectural patterns are those blocks of functions or components that tend to repeat over and again in systems and software. ThreatModeler leverages these to great advantage in reusing these patterns in threat modeling. Be it either components or templates of groups...
What Is One-Click Cloud Threat Modeling?

What Is One-Click Cloud Threat Modeling?

A recent survey by Deloitte unearthed the extraordinary fact that “only 5.8% of professionals in cloud-savvy organizations experienced slowdown due to COVID, compared to 16.4% among companies that plan to move to the cloud in 2021.” In a fast changing world, those...
Threat Modeling: Are Data Flow Diagrams Enough?

Threat Modeling: Are Data Flow Diagrams Enough?

As part of the 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), a paper was reviewed and accepted entitled: “Security Threat Modeling: Are Data Flow Diagrams Enough?” Anybody interested in the field of threat modeling would...
Architecturally-Based Process Flow Diagrams: Examples and Tips to Follow

Architecturally-Based Process Flow Diagrams: Examples and Tips to Follow

Threat modeling is catching on. Increasingly, organizations are coming to the realization that securing DevOps projects as early as possible – preferably during the initial whiteboard planning and design stages – not only reduces risk, it makes good business sense....