Welcome to our Blog
From software security to threat modeling to compliance & risk management frameworks (and everything inbetween). We've got it covered.
Featured Posts
Build a Cybersecurity Powerhouse: How to Launch a Successful Security Champion Program
Security Champions are like your cybersecurity sidekicks embedded in every department, making security a shared responsibility. They help you build a cybersecurity-conscious culture from within.
Read MoreLatest Posts
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
November 21, 2024
Product Release 4.36
To support new users, truthfully zones are now optional, we have a new and improved compliance report, customer can also configure the visibility of Assets at Business Unit level. Read the full list of improvements for release 4.36.
Product Release
November 19, 2024
9 Secure by Design Tools
Achieving robust and secure applications is no easy task, see these 9 potential tools to consider for your Secure by Design strategies.
Threat Modeling
Risk Management
November 15, 2024
History of Threat modeling
Threat modeling provides savings in both remediation, finances and resources. It has evolved over time with differing use cases and implementations. But one thing that remained consistent is its ability to produce secure by design software.
Threat Modeling
Intro to Threat Modeling
November 6, 2024
Understanding CWEs and CVEs: and how they impact your threat models
While CVEs deal with individual vulnerabilities, CWEs provide a broader, future-focused view by focusing on weaknesses that can cause multiple vulnerabilities. But is one option better than the other?
Threat Modeling
Risk Management
Methodologies & Frameworks
October 24, 2024
Product Release 4.34
Latest enhancements include a new beta feature for AWS Cloud. Developers can directly connect to their AWS cloud infrastructure and import it into their IriusRisk projects - automatically, quickly, and securely. Find out more.
Product Release
October 18, 2024
Penetration Testing and Threat Modeling - a unified approach to security
Threat modeling can better define your pen testing efforts. Penetration testing can give your threat model a full feedback loop. Are you effectively implementing both security practices?
Threat Modeling
Software security
Cloud Security
Risk Management
October 17, 2024
Driving Your Threat Modeling Program Further
Threat modeling should connect various teams, break down silos and foster a culture of security. Read more for advice on how to drive your program forward.
Intro to Threat Modeling
Threat Modeling
October 1, 2024
Hybrid Threat Modeling: Bridging Manual and Automated Approaches
Hybrid Threat Modeling blends automated tools with manual efforts for a robust, tailored security approach.
Intro to Threat Modeling
Threat Modeling
September 19, 2024
Product Release 4.33
Product Release 4.33 includes a new current risk summary report, custom filtering, trust zone visibility control, a load more v2 components, and much more.
Product Release