Welcome to our Blog

From software security to threat modeling to compliance & risk management frameworks (and everything inbetween). We've got it covered.

Featured Posts

Latest Posts

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
IriusRisk Team
The Threat Modeling Experts
April 27, 2021
CIS Security Standard for Docker available now in IriusRisk
We’re delighted to announce the release of IriusRisk 1.12.0
Product Release
IriusRisk Team
The Threat Modeling Experts
October 1, 2020
Deploying IriusRisk to AWS high availability infrastructure
Enterprise organisations are turning to high availability (HA) infrastructure to maximise uptime and speed, withstand crashes and failures, and secure access to critical applications.
Software security
Threat Modeling
IriusRisk Team
The Threat Modeling Experts
September 30, 2020
IriusRisk announces Series A Investment Round
App Security Threat Modeling Company IriusRisk Announces $6.7 Million Seri
News
IriusRisk Team
The Threat Modeling Experts
August 3, 2020
OAuth & Threat Modeling
OAuth 2.1 Threat Patterns
Software security
Threat Modeling
IriusRisk Team
The Threat Modeling Experts
June 20, 2020
IriusRisk at Lorca Live 2020
As members of the 4th cohort at Lorca, we are pleased to announce our participation on the week-long event at Lorca Live.
News
IriusRisk Team
The Threat Modeling Experts
April 27, 2020
IriusRisk at DevSecCon London – 2017
We’ve presented and sponsored every DevSecCon London event since its inception because of its focus on cutting-edge defensive conferences around.
News
IriusRisk Team
The Threat Modeling Experts
First International Workshop on Gender and Cybersecurity
Our Chief Operating Officer Cristina Bentue will participate in a round table at the First International Workshop on Gender and Cybersecurity.
Software Security
James Rabe
Head of Professional Services
Use Case - Threat Modeling SaaS Applications
Do SaaS applications need to be threat modeled? Absolutely!
Risk Management
Software security
Threat Modeling