Scroll to discover
See a Demo
Skip to content

Welcome to our Resources Centre

Read our latest threat modeling and architectural security news, articles, and thought leadership, and watch some of our most popular talks, tips, and tricks on-demand.

Stay up to date with the latest news

Click here

Threat modeling workflow for Microsoft Threat Modeling Tool

Automatically create a threat model in IriusRisk from a simple architecture designed with Microsoft Threat Modeling Tool (MTMT) using open API and IaC

See More

Securing the Software Supply Chain

We believe threat modeling is the best way to operationalize guidelines or frameworks for greater visibility and security within the software supply chain

See More

EU Cyber Resilience Act & Threat Modeling

The EU Cyber Resilience Act is a proposal for a regulation on cybersecurity for products with digital elements. See how threat modeling can help

See More

What is Threat Modeling?

Threat modeling is a repeatable way of assessing the security of your architecture, quantifying your level of risk and implementing countermeasures. 

See More

Use Case - Threat Modeling Smart Buildings with IEC/ANSI 62443

Smart building environments must ensure the equipment and processes used for automation and control meet certain standards to avoid security issues.

See More

Overcoming Analysis Paralysis

Threat modeling can sometimes pose questions to security champions and analysts: Where should the threat model startor end? What does it need to contain?

See More

Use Case - Threat Modeling SaaS Applications

This information serves as a foundation and defense for threat modeling SaaS applications. It is designed to encourage conversations in organizations...

See More

Things that may look like threat modeling, but aren't

New to threat modeling? You may not be entirely sure what it is - or isn't! Here we demystify some terms that are often confused with threat modeling.

See More

Threat Modeling Methodology: PASTA

PASTA is a risk-centric threat modeling methodology it can scale up or scale down as required which is ideal for growing businesses.

See More

Threat Modeling Methodology: TRIKE

TRIKE is an open source threat modeling process focused on the security auditing process from a risk management and defense perspective.

See More

Threat Modeling Methodology: OCTAVE

OCTAVE: Operationally Critical Threat, Asset, & Vulnerability Evaluation is a threat modeling technique focusing on assessing organizational risks.

See More