Gain Insight Into Your Attack Surface AND Compliance Requirements With Threat Modeling

Gain Insight Into Your Attack Surface AND Compliance Requirements With Threat Modeling

If you haven’t kept up with the evolution of threat modeling, you probably envision threat modeling as simply a visualization tool or a framework like STRIDE. And while there was a time when this was the sum total of threat modeling capability, these are really just...
What Are the Stages of a Threat Modeling Program

What Are the Stages of a Threat Modeling Program

If you follow our blog and understand our philosophy then you already know we think Threat Modeling is a Process Not a Project. It’s not a one-time deliverable with a beginning, a middle and an end. Instead, it’s an ongoing series of steps that an organization...
When Forbes Says Threat Modeling is Critical You Know it’s Important

When Forbes Says Threat Modeling is Critical You Know it’s Important

The Forbes Magazine has been around since 1917 and we’re guessing this is the first article they’ve ever done on threat modeling.  According to its bio, it Forbes magazine features “original articles on finance, industry, investing, and marketing topics.” And while it...
Understanding the Challenges of Securing Cloud Environments That Never Stop Changing

Understanding the Challenges of Securing Cloud Environments That Never Stop Changing

The good news with deploying applications in the cloud is that you can changes things fast in response to changing demands. The bad news? The same thing: you can change things really fast. And generally speaking, fast changes and security don’t mix very well. Clouds...
Twitter Is the Latest Victim of a Rapidly-Growing Cybersecurity Threat: Insider Attacks

Twitter Is the Latest Victim of a Rapidly-Growing Cybersecurity Threat: Insider Attacks

Many in the cybersecurity world spend their entire careers trying to prevent the kind of high-profile, reputation-wrecking cyberattack such as what occurred to Twitter earlier this month. On July 15, Twitter users the world over were puzzled to read messages promoting...
Recap: ThreatModeler at Open Security Summit and New White Paper

Recap: ThreatModeler at Open Security Summit and New White Paper

The annual, five-day Open Security Summit is unique on the Information Security conference calendar as it entails security practitioners coming together in working sessions to collaborate on moving the industry practice forward. This year was unusual however, as it...