Scroll to discover
See a Demo
Skip to content

Welcome to our Resources Centre

Read our latest threat modeling and architectural security news, articles, and thought leadership, and watch some of our most popular talks, tips, and tricks on-demand.

Stay up to date with the latest news

Click here

How to Use the Mitre ATT&CK Library in IriusRisk

This new Mitre ATT&CK library within IriusRisk provides techniques, mitigations and detections so that users can build their own risk patterns.

See More

NIST SSDF and IriusRisk Threat Modeling

Software vendors whose products have been threat modeled can demonstrate that their products have gone through a proper risk assessment

See More

IriusRisk launches online community forum Threat Modeling Connect

Free-to-use forum bringing together threat modeling experts, AppSec, DevSecOps & development teams to collaborate, promote best practices & share advice.

See More

Threat modeling workflow for Microsoft Visio

Automatically create a threat model in IriusRisk from a simple AWS architecture designed with Visio, using IriusRisk's open API and IaC capabilities

See More

Threat modeling workflow for Microsoft Threat Modeling Tool

Automatically create a threat model in IriusRisk from a simple architecture designed with Microsoft Threat Modeling Tool (MTMT) using open API and IaC

See More

Securing the Software Supply Chain

We believe threat modeling is the best way to operationalize guidelines or frameworks for greater visibility and security within the software supply chain

See More

EU Cyber Resilience Act & Threat Modeling

The EU Cyber Resilience Act is a proposal for a regulation on cybersecurity for products with digital elements. See how threat modeling can help

See More

What is Threat Modeling?

Threat modeling is a repeatable way of assessing the security of your architecture, quantifying your level of risk and implementing countermeasures. 

See More

Use Case - Threat Modeling Smart Buildings with IEC/ANSI 62443

Smart building environments must ensure the equipment and processes used for automation and control meet certain standards to avoid security issues.

See More

Overcoming Analysis Paralysis

Threat modeling can sometimes pose questions to security champions and analysts: Where should the threat model startor end? What does it need to contain?

See More

Use Case - Threat Modeling SaaS Applications

This information serves as a foundation and defense for threat modeling SaaS applications. It is designed to encourage conversations in organizations...

See More