Quantcast
Channel: ThreatModeler
Browsing all 119 articles
Browse latest View live

IoT Threat Modeling for Greater Security

The Internet of Things – or IoT – is growing at an explosive rate. A recent international study sponsored by the US Chamber of Commerce indicates that in just two years as many as 85% of organizations...

View Article



Securing IoT Requires a Big-Picture View

The familiar concept of devices that connect to the Internet – the so-called IoT or Internet of Things devices – is that they are…. well… devices. They are the smart watches, smart televisions,...

View Article

How to Improve your DevOps Implementation

DevOps is to development what the wheel was to transportation – a fundamental game changer. High-performing DevOps teams deploy more frequently, have far faster turn-around times for changes, are much...

View Article

How to Create Cross-Functional Collaboration

Organizations seeking to improve performance and their bottom line need look no further than improving their DevOps implementation. Based on survey results from more than 27,000 respondents over a...

View Article

How to Improve DevOps with Up-Front QA

Up-front QA Throughout this series on how to improve your DevOps implementation, we have considered how organizations can left-shift security fully into the project design phase and how organizations...

View Article


IoT Security is an Economic Issue for Everyone

Around the world, reporters around the globe are hard at it – writing and watching – as IoT security takes another dark turn with yet another new botnet. The new beast, dubbed IoTroop – sometimes also...

View Article

Improving DevOps Implementations with Greater Ops Visibility

DevOps creates an environment which may be systemically flawed, in part due to a lack of ops visibility into application post-deployment. Ironically, the fundamental, underlying goal of DevOps is to...

View Article

DevOps Data-Driven Transformational Leadership

Organizations are increasingly becoming digital-driven. This is no great revelation. The business world is now highly interconnected. Relationships between organizations and their vendors, suppliers,...

View Article


Improving DevOps: Shifting Security Right

DevOps discussions invariably center on automation – especially those areas that are deemed bottlenecks to getting products out the door. 47% of DevOps organizations currently automate their...

View Article


Improving DevOps: Including Legacy Systems

If there is such a thing as “traditional DevOps,” it is a two-dimensional beast. Consider, for example, the relatively simple two-dimensional graph shown below.  Let development be represented on the...

View Article

Meltdown and Spectre Addressed by ThreatModeler

With Meltdown and Spectre, 2018 could set a new standard for the “year of the cyber-attack.” Getting on top of these critical vulnerabilities will require enterprise threat modeling. Meltdown and...

View Article

Why Implement Enterprise Threat Modeling

Threat modeling for critical and high-risk application security has been a mainstay of software development for nearly a decade. The immediate benefits of application threat modeling include reducing...

View Article

Image may be NSFW.
Clik here to view.

IoT Security is an Economic Issue for Everyone

Around the world, reporters around the globe are hard at it – writing and watching – as IoT security takes another dark turn with yet another new botnet. The new beast, dubbed IoTroop – sometimes also...

View Article


Image may be NSFW.
Clik here to view.

Improving DevOps Implementations with Greater Ops Visibility

DevOps creates an environment which may be systemically flawed, in part due to a lack of ops visibility into application post-deployment. Ironically, the fundamental, underlying goal of DevOps is to...

View Article

Image may be NSFW.
Clik here to view.

DevOps Data-Driven Transformational Leadership

Organizations are increasingly becoming digital-driven. This is no great revelation. The business world is now highly interconnected. Relationships between organizations and their vendors, suppliers,...

View Article


Image may be NSFW.
Clik here to view.

Why Implement Enterprise Threat Modeling

Threat modeling for critical and high-risk application security has been a mainstay of software development for nearly a decade. The immediate benefits of application threat modeling include reducing...

View Article

Image may be NSFW.
Clik here to view.

Meltdown and Spectre Addressed by ThreatModeler

With Meltdown and Spectre, 2018 could set a new standard for the “year of the cyber-attack.” Getting on top of these critical vulnerabilities will require enterprise threat modeling.  Meltdown and...

View Article


Improving DevOps: Shifting Security Right

DevOps discussions invariably center on automation – especially those areas that are deemed bottlenecks to getting products out the door. 47% of DevOps organizations currently automate their...

View Article

Improving DevOps: Including Legacy Systems

If there is such a thing as “traditional DevOps,” it is a two-dimensional beast. Consider, for example, the relatively simple two-dimensional graph shown below. Let development be represented on the...

View Article

Image may be NSFW.
Clik here to view.

How to Implement Enterprise Threat Modeling

Understanding that enterprise threat modeling is the gold standard of threat modeling, enabling CISOs can drive consistent security policy organization-wide is one thing. Implementing it across the IT...

View Article
Browsing all 119 articles
Browse latest View live




Latest Images