Why Companies are Racing to Integrate Automated Threat Modeling into Their Workflows

Why Companies are Racing to Integrate Automated Threat Modeling into Their Workflows

Early in a technology’s evolution, the adoption can be rapid—maybe even exponential—and yet sill fly under the radar because the market is so small. And that’s where threat modeling is today. Threat modeling is not yet a category with a sizeable TAM (total addressable...
Why Every Business Needs to Threat Model Like a Bank

Why Every Business Needs to Threat Model Like a Bank

Banks are the original threat modelers. Going back to the days when they hired the Pinkerton Agency to protect their valuables being transported by stagecoach, banks have always tried to stay one step ahead of their adversaries. Of course, when it comes to protecting...
Secure Online Banking

Secure Online Banking

Financial institutions are consistently in the top-five list of cyber attack targets, with the greatest increase in data breach risk coming from outside hackers.[1] Customer financial records and associated personally identifying information are high-value commodities...
Build Threat Models for Least-Privilege at Scale with ThreatModeler and AWS

Build Threat Models for Least-Privilege at Scale with ThreatModeler and AWS

The premise behind least privilege is simple: if you want to protect your bank vault, start by being very careful about who gets a key. In the cybersecurity world, least privilege works very much the same, but instead of keys and bank vaults, its access to sensitive...
CISA Meets NY Elections Officials to Address Security

CISA Meets NY Elections Officials to Address Security

As we approach the 2020 elections, the U.S. becomes a huge target for digital threats. From election interference to fraud, the need for adequate cybersecurity measures becomes  more prevalent than ever. Challenges facing the upcoming elections seem to put the...
5 Things to Do Before You Threat Model

5 Things to Do Before You Threat Model

Threat modeling is vital for businesses trying to become proactive and deliberate in SDLC and CDLC with adequate application security. Security teams have started the new year planning ahead and discussing potential security risks to their organizations. To secure...