Apr 26, 2024 | Cyber Risk, Security, Threat Modeling
Secure Your Supply Chain in 2024: Identifying Third-Party Vendor Risks With Threat Modeling In this blog post, we will discuss how to strengthen your supply chain by leveraging the threat modeling process to identify threats from third-party vendors and secure them....
Sep 14, 2023 | Cyber Risk
Cyber insurance is now a big business (and growing more over time). Cyber insurance statistics show that claims grew by 100% in the past three years while claims closed with payments grew by 200% with around 8100 claims paid in 2021. Of course, certain industries are...
Sep 7, 2023 | CISO, Cloud security, Cloud Threat Modeling, Cyber Risk, DevSecOps, News, Threat Modeling
By Archie Agarwal In an era where cyber threats are constantly evolving, relying solely on reactive security measures is inadequate. The imperative for proactive risk assessment and mitigation has never been greater. Much like CAD drawings provide a blueprint for...
Aug 2, 2022 | Cyber Risk, DevOps, Threat Modeling, Threat Modeling as a Service, Threat Modeling Process
Nobody thinks modeling threats is a bad idea. And yet threat modeling isn’t broadly adopted in the development community yet. Why is that? According to Izar Tarandach and Matthew J. Coles in their book Threat Modeling, it’s because “convincing stakeholders that threat...
Jun 22, 2022 | Cyber Risk, Security, Threat Modeling
Everyone who is familiar with threat modeling knows that threat modeling is used to model threats in software applications. And if that’s all threat modeling did, it would still be really useful. But threat modeling can do something just as important. It can tell you...
May 2, 2022 | Cyber Risk, IoT Cybersecurity, Regulatory Compliance, security controls
When you think of cyber threats, you probably think about phishing attacks targeted at corporate employees or ransomware aimed at financial institutions. You probably don’t think about a hacker attacking a digital thermometer, but you should. The next great wave of...