Jun 25, 2020 | Events, Recent News, Threat Modeling
The annual, five-day Open Security Summit is unique on the Information Security conference calendar as it entails security practitioners coming together in working sessions to collaborate on moving the industry practice forward. This year was unusual however, as it...
Jun 8, 2020 | AWS Security Epics Automated, Cyber Risk, Threat Modeling, Threat Modeling Process
As part of the 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), a paper was reviewed and accepted entitled: “Security Threat Modeling: Are Data Flow Diagrams Enough?” Anybody interested in the field of threat modeling would...
Apr 28, 2020 | Attack Surface Analysis, CISO, DevSecOps, Enterprise DevSecOps, Enterprise Threat Modeling, Security, Threat Modeling, ThreatModeler News
As organizations struggle to maintain support of security initiatives during uncertain times, ThreatModeler is contributing its industry leading technology to embolden the DevSecOps community to continuously prioritize the protection of their applications – in minutes...
Apr 2, 2020 | Attack Surface Analysis, Cyber Risk, Recent News, Security, Threat Modeling
On Tuesday, March 31, hospitality company Marriott International disclosed information that it suffered a massive data breach. The number of consumers affected is currently tallied at 5.2 million. Marriott revealed that someone used the log-in credentials of two...
Feb 10, 2020 | Recent News, Security, Threat Modeling
Improving election cybersecurity is becoming increasingly important as recent voter fraud and election hackings continue to shake the nation. Innovators and security organizations are looking into the endless possibilities of applying blockchains to enhance election...
Jan 30, 2020 | CISO, Cloud security, DevOps, DevOps Implementation, Threat Modeling
According to a 2019 study on the financial impacts of data breaches, small-to-midsize businesses (SMBs) are “acutely” affected, averaging $2.5 million for data breach remediation. According to the IBM Cost of a Data Breach report (conducted by the Ponemon Institute),...