Application Security coaching

Risk Patterns: Your Secret Weapon for Smarter Threat Modeling

Discover how risk patterns streamline threat modeling, cut exposure, and boost security. Learn proven strategies and see how to take action today.

Level Up Your Threat Models: Data Flow Diagram Template for Miro

Enhance your threat modeling with Miro’s Data Flow Diagram Template. Create representations of your systems with trust boundaries to visualize your data flows and strengthen…

Threat Modeling Trends and Insights from ThreatModCon 2024

Our threat modeling experts, Sebastien Deleersnyder and Steven Wierckx, share their experience attending two significant events in the U.S.: the OWASP Global AppSec 2024 and…

The Power of Threat Modeling Capabilities and OWASP SAMM Mapping for Product Security

Discover the power of threat modeling in enhancing software security. Leverage the new threat modeling capabilities framework for OWASP SAMM to identify risks and mitigate…

Threat modeling in 4 steps

Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…

The Cyber Resilience Act: what it means for your company

The CRA promotes innovation and cybersecurity in European digital products. Learn how your company can comply with applicable standards.

Adapting risk calculation to your needs

The core idea behind risk calculation is that it should allow an organization to score different elements in an objective, repeatable manner. However, these parameters…

Examining attack tree tools, how do they compare?

In this article we tackle two Attack Tree tools and comepare them. Are they worth using or not?

How to protect your organization from application consent attacks

Microsoft has been warning organizations for so called consent phishing attacks, we explain what these attacks are and how we plan to stop them.

How to implement application risk profiling

In just 3 steps, we show you how to implement application risk profiling sucessfully in your organization.

Start typing and press Enter to search

Shopping Cart