In this edition, we get a guest blog on Threat Modeling ICS & OT Landscapes – Mind that Gap, there’s a sharp EDGE, and more!
In this edition, we give out five tips to improve your threat models, and more!
In this edition, we find out the role of tooling in threat modeling, and more!
Our co-founder and CTO has been crowned The Cybersecurity Personality of the Year. Read more on this award and why they chose Sebastien.
In this edition, you can read the second part of why Threat Modeling can be considered as fun as cooking a good PASTA meal!
Threat modeling is a vital aspect of software development and cybersecurity, but it can be a challenge to fully understand its importance and how to…
For this edition, we selected a variety of threat modeling content for you. From PASTA to SDWAN and everything in between.
In just 3 steps, we show you how to implement application risk profiling sucessfully in your organization.
In this blog, we take a look at why good security requirements are important and how these should be constructed.
This edition contains various fields in which Threat Modeling can play a significant role: MDR, AI/ML, Automation, Pentesting and User Stories. Exciting!