Threat Modeling is for Everyone

Threat Modeling is for Everyone

Threat modeling – in its simplest form – is about looking at a system or situation from an adversary’s perspective. From that unique perspective it is possible to identify specific potential threats that otherwise would not be considered by non-adversaries. A threat...
Cyber-Physical System Threat Modeling

Cyber-Physical System Threat Modeling

The rapid expansion of cloud computing capabilities and the Internet of Things has resulted in tremendous advances in cyber-physical systems. A cyber-physical system, or CPS, connects the virtual world with the physical world, allowing greater mobility and freedom for...
Enterprise Threat Modeling Quantifies Risk

Enterprise Threat Modeling Quantifies Risk

An ad hoc, per-application threat modeling practice is a good start. After all, bringing secure coding considerations into the application design process makes creating secure, functional products on tight agile time frame much more efficient. Over the years, ad hoc...
Make Threat Intelligence Actionable

Make Threat Intelligence Actionable

Today’s enterprises receive a myriad of new threat intelligence from multiple feeds and sources. Most organizations highly value threat intelligence as essential to a strong security posture and fulfilling their security mission. It can be challenging, however, to...