Welcome to our Blog
From software security to threat modeling to compliance & risk management frameworks (and everything inbetween). We've got it covered.
Featured Posts
Roles & Responsibilities of Threat Modeling
All roads lead to threat modeling, albeit the journey may differ by organization. If you can get contributions from multiple stakeholders, you will boost the success of your threat modeling program.
Read MoreLatest Posts
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
June 17, 2024
EU AI Act: Balancing AI-tech innovation with security and compliance
In a world where artificial intelligence (AI) is no longer the stuff of science fiction but a tangible reality, the EU Artificial Intelligence Act’s (EU AI Act) emphasis on transparency and risk management aligns well with security-by-design best practices. However, it also introduces additional layers of complexity.
Compliance & Regulation
June 17, 2024
Building a Robust LLM Pipeline on GCP: A Technical Deep Dive
Google Cloud Platform (GCP) provides a versatile toolkit to create a scalable and secure infrastructure for these complex models. Let's explore the technical components and protocols involved in building an LLM pipeline on GCP.
AI & ML
June 6, 2024
Product Release 4.29
Our best product yet has landed. Bringing unrivalled ease of use, together with an emphasis on speed and scale. Our many advancements combine to bring you faster navigation of the application and intuitive building of threat models.
Product Release
June 4, 2024
Building a Robust LLM Pipeline on AWS: A Technical Deep Dive
Each step of the AWS LLM pipeline offers the flexibility and the performance these complex models need. But with this power comes responsibility.
AI & ML
May 23, 2024
AI and threat modeling for secure architecture
We take a look at the varying roles prompt engineering can play, potential bias within your own prompts, as well as how it can aid threat modeling and creation of secure architecture.
AI & ML
Threat Modeling
May 14, 2024
What is Application Security and what should you include?
We recommend six core application security activities to identify, manage and mitigate risk effectively; Threat Modeling, Secure Coding, Security Testing, Access Control, Encryption and Patch Management are crucial for AppSec.
Software security
Threat Modeling
May 9, 2024
Enhancing US Financial Security: Understanding OCC and FFIEC Regulations
Risk Assessment activities, improvements, and processes are imperative to the functioning of any financial organization. Are you considering the OCC and the FFIEC requirements?
Risk Management
Standards, Compliance and Regulations
Threat Modeling
May 8, 2024
Product Release 4.28
Manage your threat modeling process better with an enhanced Workflows user interface and experience. See the full list of improvements in this release.
Product Release
May 8, 2024
Secure-by-Design and Threat Modeling, your guide to a proactive security strategy
Is the cyber landscape anything other than a stormy sea? Security-by-design practices, and threat modeling can provide a proactive shift left approach to navigate turbulent waters…
Threat Modeling
Software security