Threat Modeling

Debunking Three Common Threat Modeling Myths
The benefits of threat modeling are significant. Not only does it provide a systematic process for evaluating potential threats to an organization’s system, but it also creates a framework for informed decision-making, ...
The step-by-step guide to threat modeling
Securing your software requires a mix of automated and manual processes, and threat modeling is a crucial part of the mix ...

FDA, MDIC and MITRE Publish Medical Device Threat Modeling Playbook
Modern medical devices are complex, networked and often vulnerable to attack. With that in mind, the U.S. Food and Drug Administration (FDA) has funded the development of a playbook for threat modeling ...

Process Monitoring: Detect Malicious Behavior in Your Containers
The default pod provisioning mechanism in Kubernetes has a substantial attack surface, making it susceptible to malevolent exploits and container breakouts. To achieve effective runtime security, your containerized workloads in Kubernetes require ...

Threat Modeling Should Be A Team Sport
Threat Modeling Should Be A Team SportPen-tester, Vulnerability Scanning, Risk Management, and Threat Modeling should be one engagement.Pen-tester, Vulnerability Scanning, Risk Management, and Threat Modeling should be one engagement.In 2020, a group ...

Navigating the road ahead for automotive cybersecurity
With challenging cybersecurity requirements on the horizon for automotive companies in 2022, security teams can look to BSIMM12 for guidance. The post Navigating the road ahead for automotive cybersecurity appeared first on ...

Drive down the risks of security threats with secure ELDs
During this National Truck Driver Appreciation Week, we review how to ensure security on the road with ELD cyber security considerations. The post Drive down the risks of security threats with secure ...
Using Threat Modeling to Boost Your Incident Response Strategy
Threat modeling is increasing in importance as a way to plan security in advance. Instead of merely reacting to threats and incidents, an organization can identify and evaluate its security posture, relevant ...

Manual security testing services vs. automated AppSec tools: Which to use?
Manual security testing services and automated AppSec tools have their place in DevOps. Knowing which to use will make your security efforts more effective. The post Manual security testing services vs. automated ...

Threat Modeling in the Age of Automation
Cybersecurity threats are rising fast, leading enterprises that build applications to look more closely at security measures built on precautionary principles, including threat modeling, which has become core to ensuring applications can ...