Threat Modeling & Risk Assessments

Learn how to fit threat modeling in modern enterprise application life cycle environments. Leverage our platform to operationalize your risk assessment process.

  • Multinational financial services company implements SD Elements

    Multinational financial services company implements SD Elements

    Read Flipbook
  • Scaling Threat Modeling for Secure DevOps

    Scaling Threat Modeling for Secure DevOps

    Read Article
  • Shifting Towards Scalable Threat Modeling

    Shifting Towards Scalable Threat Modeling

    Threat modeling is a core activity in the process of building technology that can be trusted, allowing for the critical analysis of applications, using security and engineering resources.

    Read Flipbook
  • Managing Risk at Scale: Does the Modern Software Company Have Room for Threat Modeling? Part 2

    Managing Risk at Scale: Does the Modern Software Company Have Room for Threat Modeling? Part 2

    Learn more about lightweight threat modeling at scale.

    Read Article
  • Managing Risk at Scale: Does the Modern Software Company Have Room for Threat Modeling? Part 1

    Managing Risk at Scale: Does the Modern Software Company Have Room for Threat Modeling? Part 1

    Is threat modeling a blocker for security in your organization when it should be an enabler? If it is, you’re not the only one.

    Read Article
  • Modernizing Risk Assessment to Support Your Business’ DevOps57:36

    Modernizing Risk Assessment to Support Your Business’ DevOps

    With agile & DevOps initiatives taking place in many organizations today, risk assessment processes need to be modernized in order to support the business in managing security risk in a timely, effici

    Watch Video
  • Modernizing Risk Assessments with SD Elements

    Modernizing Risk Assessments with SD Elements

    Read Flipbook
  • Scaling Software Risk Assessments

    Scaling Software Risk Assessments

    Read Flipbook
  • Scaling Risk Assessments for Applications

    Scaling Risk Assessments for Applications

    Risk assessments are integral to the modern organization’s success, but they’re also time-consuming and difficult to manage. Learn how you can scale threat risk assessments in your organization.

    Read Article
  • Easy Threat Modeling with SD Elements

    Easy Threat Modeling with SD Elements

    Learn how our expert platform can automate threat modeling in your organization.

    Read Flipbook
  • Threat model at scale: How to go from policy to execution

    Threat model at scale: How to go from policy to execution

    Security expert, Altaz Valani's guidance on how to build cyber-resilience through threat modeling.

    Read Article
  • The modern day approach to threat modeling: automate it using SD Elements

    The modern day approach to threat modeling: automate it using SD Elements

    Traditional threat modeling is struggling to find a place in application security today. Learn about how organizations are automating the process.

    Read Article
  • Webinar: Scaling Your Cybersecurity Threat Modeling57:12

    Webinar: Scaling Your Cybersecurity Threat Modeling

    Learn how the scalability problems of a traditional threat modeling framework can be better managed by introducing systems, data, and people components. From this, one can derive a repeatable and audi

    Watch Video
  • How to Scale Threat Modeling

    How to Scale Threat Modeling

    More and more organizations are employing threat modeling practices in an effort to improve the security architecture of their applications. This process can be very costly and time consuming as...

    Read Article
  • SD Elements in the Modern Enterprise

    SD Elements in the Modern Enterprise

    Our expert platform, SD Elements, fills a handful of security gaps in the modern enterprise. Learn about its use cases here.

    Read Flipbook
  • Publish-Subscribe Threat Modeling

    Publish-Subscribe Threat Modeling

    The Publish-Subscribe messaging pattern is a solution to message dissemination and delivery challenges. Instead of directly transmitting a message to an end receiver (e.g. the way the traditional...

    Read Article
  • SEC 202 Threat Model Express

    SEC 202 Threat Model Express

    Learn about Security Compass's course on Threat Model Express.

    Read Flipbook
  • A Large Financial Institution Uses SD Elements as their Lightweight Threat Modeling Tool

    A Large Financial Institution Uses SD Elements as their Lightweight Threat Modeling Tool

    Learn how our client used SD Elements as their automated threat modeling tool.

    Read Article
  • Take 15 minutes to uncover your high-risk vulnerabilities

    Take 15 minutes to uncover your high-risk vulnerabilities

    Methods for assessing software security risk fall into two broad types: Modeling: Understanding the risks the application may conceptually be vulnerable to. It includes threat modeling, threat...

    Read Article
  • loading
    Loading More...