Search results: threat modeling

Lessons in threat modeling: How attack trees can deliver AppSec by design

Lessons in threat modeling: How attack trees can deliver AppSec by design

As important as threat modeling is to securing applications by design, it is a process that can be time-consuming and arduous for an organization. It’s a grand exercise that requires a thorough ...
Threat modeling: the future of cybersecurity or another buzzword⎥Derek Fisher

Threat modeling: the future of cybersecurity or another buzzword⎥Derek Fisher (author of The Application Security Handbook)

Threat modeling is the future of cybersecurity or just another buzzword? Discover the answer to this question and more in our latest podcast ...
Google SLSA framework showing software lifecycle stages.

Mastering SDLC Security: Best Practices, DevSecOps, and Threat Modeling

In the ever-evolving landscape of software development, it’s become absolutely paramount to ensure robust security measures throughout the Software Development Lifecycle (SDLC). Need proof? In the last three years alone, we’ve witnessed ...
Why is Threat Modeling So Important in 2022

Why is Threat Modeling So Important in 2024?

| | Blog, Topic
There’s an old saying — an ounce of prevention is worth a pound of cure.  Nowhere does this hold truer than in cybersecurity. Passive, reactive cyber defenses have long struggled to keep ...
Zero trust and threat modeling: Is it time for AppSec to get on board?

Zero trust and threat modeling: Is it time for AppSec to get on board?

As the use of zero-trust architecture grows, it's becoming apparent to threat modelers that if they want to reap benefits, they will need to modify their existing practices to do it.  ...

Maximizing the value of threat modeling

|
Explore four practices that maximize the value of threat models throughout the entire development lifecycle ...
Threat modeling and the supply chain: An essential tool for managing risk across the SDLC

Threat modeling and the supply chain: An essential tool for managing risk across the SDLC

As organizations seek better ways to establish secure-by-design software, threat modeling can play a huge role in anticipating, avoiding, and planning for potential risks in software across all phases of the software ...
Rust programming language progress report: New threat modeling, tools bolster supply chain security

Rust programming language progress report: New threat modeling, tools bolster supply chain security

The group dedicated to securing Rust — one of the hottest programming languages among development teams today, one embraced by Microsoft, Amazon, and the U.S. government — issued its first progress report ...
Types of Threat Modeling

Threat Modeling Unveiled: Enhancing Security in the Digital Age

In the fast-paced digital landscape, security breaches and data compromises have become prevalent. To counter these threats, organizations are turning to a powerful technique known as threat modeling. This blog explores the ...