News and articles
In this edition, we get a guest blog on Supply-Chain Security: Evaluation of Threats and Mitigations
In this blog, junior consultant Cesar explains the proces of notetaking during Threat Modeling assessment meetings.
On Thursday, Feb. 28, cyber experts will meet at Log!ville in Niel, and give talks on various cybersecurity topics relevant…
In this edition, we get a guest blog on The Hitchhiker’s Guide for Failing Threat Modeling
Threat modeling is a vital aspect of software development and cybersecurity, but it can be a challenge to fully understand…
As businesses continue to shift towards cloud-based operations, it’s crucial to ensure that your online systems access is properly secured.…
We’re proud to announce our Cybersecurity Café! Read more about it.
In this edition, we get a guest blog on Threat Modeling ICS & OT Landscapes – Mind that Gap, there’s…
Steven takes a look at the popular ChatGPT, is it as impressive as people say?
In this blog, we cover continuous assessment and the benefits that it brings to the table.
Trainee Yael shares some tips on how to jumpstart your career in cybersecurity.
In this edition, we give out five tips to improve your threat models, and more!
In this edition, we find out the role of tooling in threat modeling, and more!
Our co-founder and CTO has been crowned The Cybersecurity Personality of the Year. Read more on this award and why…
In this edition, you can read the second part of why Threat Modeling can be considered as fun as cooking…
The core idea behind risk calculation is that it should allow an organization to score different elements in an objective,…
Threat modeling is a vital aspect of software development and cybersecurity, but it can be a challenge to fully understand…
For this edition, we selected a variety of threat modeling content for you. From PASTA to SDWAN and everything in…