Nov 14, 2016 | Cloud security, Threat Modeling, Threat Models, ThreatModeler
In a continuous push for competitive advantage, cost benefits, and the ability to focus more on their core competencies, organizations are increasingly migrating critical applications and data centers to a cloud environment. According to leading cloud service provider...
Oct 14, 2016 | Threat Modeling, ThreatModeler
Threat modeling is all about looking at potential threats from the attacker’s point of view so that those responsible for mounting a defense can prioritize their resources and prepare appropriate responses. Where are the high-value assets? What is the attack surface?...
Sep 6, 2016 | Threat Modeling, ThreatModeler
Development teams and infrastructure teams need specialized threat modeling practices in order to optimize each of their unique security requirements. The VAST threat modeling methodology lists these two practices as application threat modeling and operational threat...
Apr 15, 2016 | Threat Modeling, ThreatModeler
Threat modeling is becoming a viable method for better understanding an organization’s attack surface, its security threats and security requirements. When comparing ThreatModeler to Microsoft Threat Modeling Tool (TMT), it is important to understand the...
Apr 15, 2016 | Threat Modeling
Our past blog posts have covered why organizations need to implement enterprise threat modeling and make it an ongoing process, versus treating it as a one-time exercise, and also how IT executives, along with other key stakeholders, benefit from a scalable and...
Apr 15, 2016 | CISO, Threat Modeling
A recent article by CSO magazine [1] highlights key findings from CISOs (Chief Information Security Officers) on how threat modeling software helps eliminate blind spots and more complex threat scenarios in their application risk profile. It also provided detail as to...