The art and science of product security: A deep dive with Jacob Salassi

The art and science of product security: A deep dive with Jacob Salassi

Discover the main takeaways from our conversation on product security with Jacob Salassi, Director of Product Security at Snowflake ...
Lessons in threat modeling: How attack trees can deliver AppSec by design

Lessons in threat modeling: How attack trees can deliver AppSec by design

As important as threat modeling is to securing applications by design, it is a process that can be time-consuming and arduous for an organization. It’s a grand exercise that requires a thorough ...
Threat modeling: the future of cybersecurity or another buzzword⎥Derek Fisher

Threat modeling: the future of cybersecurity or another buzzword⎥Derek Fisher (author of The Application Security Handbook)

Threat modeling is the future of cybersecurity or just another buzzword? Discover the answer to this question and more in our latest podcast ...
Cybersecurity Insights with Contrast CISO David Lindner | 11/17

Cybersecurity Insights with Contrast CISO David Lindner | 11/17

Insight #1 Organizations are continuing to pay more for top cybersecurity talent, and with the Securities and Exchange’s (SEC’s) most recent lawsuit against SolarWinds and its former Chief Information Security Officer, those ...
Zero trust and threat modeling: Is it time for AppSec to get on board?

Zero trust and threat modeling: Is it time for AppSec to get on board?

As the use of zero-trust architecture grows, it's becoming apparent to threat modelers that if they want to reap benefits, they will need to modify their existing practices to do it.  ...
Cybersecurity Insights with Contrast CISO David Lindner | 11/10

Cybersecurity Insights with Contrast CISO David Lindner | 11/10

Insight #1 The U.S. has launched the Shields Ready campaign: a campaign “about making resilience during incidents a reality by taking action before incidents occur.” I love this focus on critical national ...
Threat modeling and the supply chain: An essential tool for managing risk across the SDLC

Threat modeling and the supply chain: An essential tool for managing risk across the SDLC

As organizations seek better ways to establish secure-by-design software, threat modeling can play a huge role in anticipating, avoiding, and planning for potential risks in software across all phases of the software ...
Types of Threat Modeling

Threat Modeling Unveiled: Enhancing Security in the Digital Age

In the fast-paced digital landscape, security breaches and data compromises have become prevalent. To counter these threats, organizations are turning to a powerful technique known as threat modeling. This blog explores the ...