Welcome to our Blog

From software security to threat modeling to compliance & risk management frameworks (and everything inbetween). We've got it covered.

Featured Posts

Latest Posts

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Lamine Aouad
Security Researcher
March 27, 2023
ICS security in the cloud age
What are the security implications to the IT/OT convergence, and what can you do about it?
Cloud Security
Threat Modeling
Supply Chain Security
IriusRisk Team
The Threat Modeling Experts
March 25, 2023
Product Update: Release 4.16
We are excited to announce the release of IriusRisk 4.16 which includes these new enhancements and features:
Product Release
IriusRisk Team
The Threat Modeling Experts
March 20, 2023
IriusRisk grew over 80% in 2022
Secure design leader doubles down on mission and launches into new markets
News
IriusRisk Team
The Threat Modeling Experts
March 20, 2023
Analyzing Risk and Automating Threat Modeling within your Supply Chain
See how threat modeling, risk assessments and other frameworks can help.
Risk Management
Software security
Threat Modeling
Supply Chain Security
IriusRisk Team
The Threat Modeling Experts
March 2, 2023
Product Update: Release 4.13
We are excited to announce the release of IriusRisk 4.13 which includes these new enhancements and features:
Product Release
February 22, 2023
Product Update: Release 4.1
We are very excited to announce the first update to the Version 4 release of IriusRisk, and the first update of the year. This release includes new features as well as improvements, including:
Product Release
Lamine Aouad
Security Researcher
February 9, 2023
Threat Modeling vs. Vulnerability Management
Threat modeling is proactive, addressing security during development, while vulnerability management is reactive, focusing on fixing existing issues.
Software security
Threat Modeling
Jorge Esperón
Senior Security Architect
February 8, 2023
Threat modeling as a way of thinking about design flaws - Log4j case
This article explores the importance of threat modeling in the context of the Log4j case, emphasizing the need for proactive security practices in software design and development. It discusses the differences between design flaws and implementation issues and highlights the four key questions in threat modeling.
Software security
Threat Modeling
IriusRisk Team
The Threat Modeling Experts
February 2, 2023
Product Update: Release 4.12
We are excited to announce the release of IriusRisk 4.12 which includes these new enhancements and features:
Product Release