This months Threat Modeling Insider edition features a blog on the friction often encountered during DevSecOps adoption and highlights how Threat Modeling can be the…
Our ‘CISO Insider’ newsletter is rebranding to ‘Security Leader Insider’ to better reflect our evolving audience and the broader scope of the content we provide.
Explore the evolving role of CISOs as they navigate increasing regulatory challenges in cybersecurity. Learn about key laws, risk management, resilience, supply chain security, and…
This months Threat Modeling Insider edition features a blog on the power of threat modeling capabilities and OWASP SAMM mapping for product security.
Discover the power of threat modeling in enhancing software security. Leverage the new threat modeling capabilities framework for OWASP SAMM to identify risks and mitigate…
Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…
In a bid to bolster the cybersecurity of critical infrastructure organizations across Europe, the European Commission is rolling out a new initiative under the NIS2…
This edition focuses on demystifying the NIS2 directive, with a guest article by Taco Mulder and our latest The Wide Open podcast, featuring Jasper Hooft…
This months Threat Modeling Insider edition features a chance to win a ticket to ThreatModCon in Lisbon!
In this series of blogs, we unravel the complexities of creating a successful threat modeling strategy