Aug 1, 2017 | Extended Capabilities, Threat Modeling, ThreatModeler
Threat modeling has a well-proven capacity to provide agile DevOps teams a “security heads-up,” during project design, especially in cases where application security is a critical priority. In our previous article comparing Microsoft’s Threat Modeling Tool (TMT) to...
Jul 19, 2017 | IoT Cybersecurity, Threat Modeling, ThreatModeler
Many security professionals are die-hard Microsoft Threat Modeling Tool (TMT) fans. After all, it is free, and there are no limits from Microsoft on the number of users or threat models you are allowed to make. Moreover, perhaps most importantly – they have been using...
Jun 29, 2017 | DevOps, Threat Modeling
Threat modeling – in its simplest form – is about looking at a system or situation from an adversary’s perspective. From that unique perspective it is possible to identify specific potential threats that otherwise would not be considered by non-adversaries. A threat...
May 30, 2017 | Cyber Risk, Threat Modeling
The rapid expansion of cloud computing capabilities and the Internet of Things has resulted in tremendous advances in cyber-physical systems. A cyber-physical system, or CPS, connects the virtual world with the physical world, allowing greater mobility and freedom for...
Apr 20, 2017 | Threat Modeling
An ad hoc, per-application threat modeling practice is a good start. After all, bringing secure coding considerations into the application design process makes creating secure, functional products on tight agile time frame much more efficient. Over the years, ad hoc...
Mar 23, 2017 | Risk Management, Threat Modeling
Today’s enterprises receive a myriad of new threat intelligence from multiple feeds and sources. Most organizations highly value threat intelligence as essential to a strong security posture and fulfilling their security mission. It can be challenging, however, to...