Aug 1, 2017 | Extended Capabilities, Threat Modeling, ThreatModeler
Threat modeling has a well-proven capacity to provide agile DevOps teams a “security heads-up,” during project design, especially in cases where application security is a critical priority. In our previous article comparing Microsoft’s Threat Modeling Tool (TMT) to...
Jul 19, 2017 | IoT Cybersecurity, Threat Modeling, ThreatModeler
Many security professionals are die-hard Microsoft Threat Modeling Tool (TMT) fans. After all, it is free, and there are no limits from Microsoft on the number of users or threat models you are allowed to make. Moreover, perhaps most importantly – they have been using...
Nov 14, 2016 | Cloud security, Threat Modeling, Threat Models, ThreatModeler
In a continuous push for competitive advantage, cost benefits, and the ability to focus more on their core competencies, organizations are increasingly migrating critical applications and data centers to a cloud environment. According to leading cloud service provider...
Oct 14, 2016 | Threat Modeling, ThreatModeler
Threat modeling is all about looking at potential threats from the attacker’s point of view so that those responsible for mounting a defense can prioritize their resources and prepare appropriate responses. Where are the high-value assets? What is the attack surface?...
Sep 20, 2016 | ThreatModeler
ThreatModeler’s Caption Contest What’s Your Smart TV Watching Tonight? In an effort to educate consumers about the collateral damage that comes from various types of data breaches, we’ve launched a humorous caption contest series to bring more awareness to...
Sep 6, 2016 | Threat Modeling, ThreatModeler
Development teams and infrastructure teams need specialized threat modeling practices in order to optimize each of their unique security requirements. The VAST threat modeling methodology lists these two practices as application threat modeling and operational threat...