Threat Modeling

  • Firmware Security: How to Identify and Prevent Vulnerabilities

    Firmware Security: How to Identify and Prevent Vulnerabilities

    Cyber attacks on hardware or IoT devices can have a far-reaching and deadly impact. Learn how you can make firmware more secure.

    Read Flipbook
  • Best Practices to Ensure Firmware Security

    Best Practices to Ensure Firmware Security

    As software layer breaches get increasingly traced to firmware vulnerabilities, we must consider building secure products. Read more to get actionable steps on how to ensure firmware security.

    Read Flipbook
  • Evolving Threat Modeling for Agility and Business Value

    Evolving Threat Modeling for Agility and Business Value

    Traditional threat modeling approaches are no longer scalable or accurate in an agile, cloud-based, microservices world. How can we evolve threat modeling to fit DevSecOps processes?

    Read Flipbook
  • The 2021 State of DevSecOps: Challenges and Drivers

    The 2021 State of DevSecOps: Challenges and Drivers

    In our survey, we found a rising trend toward the adoption of DevSecOps over the last year.

    Read Article
  • The 2021 State of DevSecOps

    The 2021 State of DevSecOps

    In 2020, the move to remote work exposed organizations to new cyberattacks, leading to increased adoption of DevSecOps. Let's find out where it's headed in 2021.

    Read Article
  • Survey: The 2021 State of DevSecOps

    Survey: The 2021 State of DevSecOps

    Last year was challenging, but it also presented a great opportunity for organizations to address cybersecurity in scalable ways. Let's learn where security is headed in 2021.

    Read Article
  • Software Security: An Enabler for Development Teams

    Software Security: An Enabler for Development Teams

    In many organizations, software security is perceived as a roadblock. The apparent challenge lies in balancing the need to meet software development deadlines with security.

    Read Flipbook
  • Build a Product Security Program

    Build a Product Security Program

    What makes product security different from software security.

    Read Article
  • Proactively Managing Security in DevSecOps

    Proactively Managing Security in DevSecOps

    We will discuss shifting security to the left and being more proactive. Using Top 10 lists is a good starting point.

    Read Article
  • Understanding the Difference Between Product & Software Security

    Understanding the Difference Between Product & Software Security

    Today we are joined by Altaz Valani from Security Compass and Arun Prabhakar, Security Consultant at Security Compass, to talk about product security.

    Read Article
  • Vulnerability Scanners: Are These Enough for Your Applications?

    Vulnerability Scanners: Are These Enough for Your Applications?

    Security testing has increased considerably over the past decade. But are vulnerability scanners enough to ensure software security?

    Read Article
  • FINRA Leverages SD Elements to Mitigate Risks and Improve Time to Market

    FINRA Leverages SD Elements to Mitigate Risks and Improve Time to Market

    Threat modeling is a time-consuming process that requires the expertise of security professionals. Learn how FINRA leveraged SD Elements to rapidly identify and mitigate risks.

    Read Flipbook
  • Smart Software Delivery Pipelines1:00:45

    Smart Software Delivery Pipelines

    In this webinar, we introduce the idea of making smarter use of current DevOps pipelines. As we gather insights through the SDLC process, using this information for further analysis can be fruitful.

    Watch Video
  • Evolving Threat Modeling to Fit DevOps

    Evolving Threat Modeling to Fit DevOps

    Many security teams still use data flow diagrams to build security into applications. But, is that the right threat modeling approach for security?

    Read Article
  • Threat Modeling: Finding the Best Approach for Your Organization

    Threat Modeling: Finding the Best Approach for Your Organization

    The idea behind threat modeling is simple; avoiding software flaws is more secure than fixing vulnerabilities. Learn how you can scale this approach across your organization.

    Read Flipbook
  • Evolving Threat Modeling to Fit DevOps57:44

    Evolving Threat Modeling to Fit DevOps

    Traditional threat modeling approaches don’t fit easily in today's fast-moving DevOps pipelines. Is there a way to speed-up these traditional processes?

    Watch Video
  • A New Approach to Threat Modeling1:59

    A New Approach to Threat Modeling

    Watch this video to learn how you can scale your threat modeling efforts across your entire application portfolio through automation.

    Watch Video
  • The Developer’s Dilemma

    The Developer’s Dilemma

    Faster software time to market helps companies gain competitive advantage which is why companies speed-up releases. But are they building-in security?

    Read Flipbook
  • Building Smart DevSecOps Pipelines For Fast Deployment

    Building Smart DevSecOps Pipelines For Fast Deployment

    We consistently talk about using DevSecOps to improve collaboration and deployment speed, but what about adding intelligence to our DevSecOps pipelines?

    Read Article
  • Security Value Streams57:04

    Security Value Streams

    In the fast-evolving tech world, security teams must be able to explain how they provide business value without using complicated jargon. Let's learn how.

    Watch Video
  • loading
    Loading More...