Aug 28, 2019 | AWS, Threat Modeling
With the adoption of cloud data centers, organizations are now able to scale their applications at reasonable costs. Most cloud platform infrastructures are serverless – meaning the cloud platform provider manages and maintains the IT infrastructure systems....
Aug 12, 2019 | Methodology, Threat Modeling
Threat modeling methodologies, such as STRIDE, VAST, and TRIKE, are systematic approaches used to identify, understand, and manage potential threats to a system. Threat modeling methodologies aid in the design of robust security measures by prioritizing risks based on...
Aug 7, 2019 | IoT Cybersecurity, Methodology, Security, Threat Modeling, Threat Modeling Process, Threat Models, ThreatModeler
Internet of Things (IoT) solutions are trending at an explosive rate, especially in the business world. With an exponential increase in devices that connect to the internet, businesses see huge benefits for communications and productivity. However, this can also leave...
Nov 19, 2018 | Threat Modeling, Threat Modeling Tools
Since Edward Amoroso first introduced the concept of threat trees in 1994 within his book “Fundamentals of Computer Security Technology,“ threat modeling tools and methodologies have evolved to meet the changing needs of the threat landscape. The concept of threat...
Nov 16, 2018 | Cloud Threat Modeling, Threat Modeling
Cloud computing continues to revolutionize the way organizations manage their data. With the rapid growth of the cloud and new services arising daily, enterprises are more eager to accomplish goals while ensuring security in the development process. The introduction...
Nov 1, 2018 | Enterprise Threat Modeling, Threat Modeling, Threat Modeling Software
Threat modeling is known as one of the most significant methodologies in the security of applications and the software development life cycle. A threat modeling tool helps security experts to identify potential threats and risks performed by attackers to protect a...