Welcome to our Blog
From software security to threat modeling to compliance & risk management frameworks (and everything inbetween). We've got it covered.
Featured Posts
Threat modeling for IIoT Devices and Gateways
The ISASecure ICSA certification provides a robust framework for ensuring that IIoT components meet high-security standards. IriusRisk now includes both IEC 62443 4-2 and ICSA-500 to support the ICSA certification and standard threat modeling process of IIoT devices and gateways.
Read MoreLatest Posts
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
August 13, 2024
Roles & Responsibilities of Threat Modeling
All roads lead to threat modeling, albeit the journey may differ by organization. If you can get contributions from multiple stakeholders, you will boost the success of your threat modeling program.
Threat Modeling
Intro to Threat Modeling
July 25, 2024
Product Release 4.31
Release 4.31 contains several changes and enhancements including: importing OTM YAML files through the UI, a revamped Technical Countermeasures Report, and user collaboration in Community Edition.
Product Release
June 27, 2024
Product Release 4.30
The wait is over - real AI powered threat modeling is here! Over 100 Azure V2 components to deliver unparalleled accuracy and effective threat modeling.
Product Release
AI & ML
June 21, 2024
Building a Production-Ready LLM Pipeline on Azure: A Technical Walkthrough
Building a robust LLM pipeline on Azure requires careful consideration of various factors, including data management, model training, deployment, monitoring, and feedback loops.
AI & ML
June 17, 2024
EU AI Act: Balancing AI-tech innovation with security and compliance
In a world where artificial intelligence (AI) is no longer the stuff of science fiction but a tangible reality, the EU Artificial Intelligence Act’s (EU AI Act) emphasis on transparency and risk management aligns well with security-by-design best practices. However, it also introduces additional layers of complexity.
Compliance & Regulation
June 17, 2024
Building a Robust LLM Pipeline on GCP: A Technical Deep Dive
Google Cloud Platform (GCP) provides a versatile toolkit to create a scalable and secure infrastructure for these complex models. Let's explore the technical components and protocols involved in building an LLM pipeline on GCP.
AI & ML
June 6, 2024
Product Release 4.29
Our best product yet has landed. Bringing unrivalled ease of use, together with an emphasis on speed and scale. Our many advancements combine to bring you faster navigation of the application and intuitive building of threat models.
Product Release
June 4, 2024
Building a Robust LLM Pipeline on AWS: A Technical Deep Dive
Each step of the AWS LLM pipeline offers the flexibility and the performance these complex models need. But with this power comes responsibility.
AI & ML
May 23, 2024
AI and threat modeling for secure architecture
We take a look at the varying roles prompt engineering can play, potential bias within your own prompts, as well as how it can aid threat modeling and creation of secure architecture.
AI & ML
Threat Modeling