Threat Modeling
Putting Threat Modeling Into Practice: A Guide for Business Leaders
By pushing past the hurdles that can make threat modeling challenging, business leaders can take full advantage of threat models to give their organizations a leg up in the battle against cyberattacks ...
Security Boulevard
LockBit 3.0: The Rising Costs of Ransomware Attacks
Ransomware attacks have become increasingly sophisticated and costly, with LockBit 3.0 emerging as a formidable adversary. This latest iteration of ransomware is not just a technical challenge but a financial nightmare, costing ...
When it comes to threat modeling, not all threats are created equal
One fundamental principle every threat modeler learns very early in their career is that not all threats are created equal. Some threats can be fixed more easily than others. Among the threats ...
Where GenAI intersects with threat modeling: 3 key benefits for AppSec
As application security (AppSec) security leaders seek to drive Security by Design initiatives in 2024, threat modeling is becoming more prevalent. In one recent study, 73% of companies said they do threat ...
The art and science of product security: A deep dive with Jacob Salassi
Discover the main takeaways from our conversation on product security with Jacob Salassi, Director of Product Security at Snowflake ...
Lessons in threat modeling: How attack trees can deliver AppSec by design
As important as threat modeling is to securing applications by design, it is a process that can be time-consuming and arduous for an organization. It’s a grand exercise that requires a thorough ...
Threat modeling: the future of cybersecurity or another buzzword⎥Derek Fisher (author of The Application Security Handbook)
Threat modeling is the future of cybersecurity or just another buzzword? Discover the answer to this question and more in our latest podcast ...
Cybersecurity Insights with Contrast CISO David Lindner | 11/17
Insight #1 Organizations are continuing to pay more for top cybersecurity talent, and with the Securities and Exchange’s (SEC’s) most recent lawsuit against SolarWinds and its former Chief Information Security Officer, those ...
Zero trust and threat modeling: Is it time for AppSec to get on board?
As the use of zero-trust architecture grows, it's becoming apparent to threat modelers that if they want to reap benefits, they will need to modify their existing practices to do it. ...