ThreatModeler partners with NYU to launch Threat Modeling Program

ThreatModeler partners with NYU to launch Threat Modeling Program

We are excited to announce the launch of our ThreatModeler Certified Practitioner Program – Introduction to Threat Modeling partnering with New York University’s Tandon School of Engineering. Threat modeling is a rapidly growing requirement for many...
Empowering Women in Technology – International Women’s Day 2024

Empowering Women in Technology – International Women’s Day 2024

This International Women’s Day, let’s challenge the outdated narrative that has held back countless women in technology. The myth that women are somehow less capable in technical fields is crumbling, and here at ThreatModeler we are proud to lead the...
ThreatModeler Launches Free, Lite Community Edition

ThreatModeler Launches Free, Lite Community Edition

As organizations struggle to maintain support of security initiatives during uncertain times, ThreatModeler is contributing its industry leading technology to embolden the DevSecOps community to continuously prioritize the protection of their applications – in minutes...
ThreatModeler Talks Security at RSA Conference 2019

ThreatModeler Talks Security at RSA Conference 2019

RSA Conference 2019 has come and gone successfully in the city of San Francisco. Last week, hundreds of companies were gathered in what is known as the most important cybersecurity event in the world. With over 40 thousand attendees, 740 speakers across 621 sessions...
The Must-Attend Cybersecurity Conferences in 2019

The Must-Attend Cybersecurity Conferences in 2019

Conferences are important vehicles allowing professionals to gain valuable insights from leading experts in a specific industry. The fast-growing world of cybersecurity and information technology requires professionals to keep up-to-date on IT security topics....
ThreatModeler PRO: A New Automated Threat Modeling Solution

ThreatModeler PRO: A New Automated Threat Modeling Solution

In a continually evolving threat environment, cybersecurity concerns can change on a daily basis. More and more, enterprises require a streamlined process for consistent, continual assessment of their cyber risk profile and attack surface to prioritize limited...