New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

Is next-gen threat modeling even about threats?

New York Tech Editorial Team by New York Tech Editorial Team
March 28, 2022
in Cybersecurity
0
Is next-gen threat modeling even about threats?
Share on FacebookShare on Twitter

The threat landscape evolves with technology, and as threats grow in sophistication, there are concerns about major events like the Colonial Pipeline ransomware attack or the Equifax breach repeating themselves elsewhere. While mainstream media focuses on operational cybersecurity, intelligent application firewalls, and other defensive and reactive solutions, the 2021 Verizon Data Breach Investigation Report suggests that insecure code and configuration in software is the root cause that needs to be addressed.

modern threat modeling

To address the challenges of insecure software development and deployment, the industry is moving to bake security into the software development life cycle (SDLC). Many experts attempt to use traditional threat modeling as their first line of business to address security in the SDLC.

But what if everyone is doing threat modeling wrong?

The industry standard for how we conduct threat modeling today evolved from past meetings where security professionals piled into a conference room and brainstormed potential threats that might affect their software. This labor-intensive process often caused communication issues between security professionals and developers. The major flaw in this approach is that only the threats security professionals thought about during the development of their modeling platforms are being addressed by their technology.

Threat modeling has changed throughout the years

With the development of DevSecOps, modern threat modeling is less focused on detailed analysis of complex threat scenarios. This might seem counterintuitive, and you might think that a threat model without threats is not going to give any information at all. But modern threat modeling through DevSecOps provides superior results because threat prevention starts from the ground up. DevSecOps and the philosophy of building secure code from the beginning deemphasizes individual threats and how they manifested in the form of vulnerabilities and focuses on baking in prevention early in the software development process. In a sense, you eliminate the vulnerabilities by leveraging secure design and programming good code from the start.

Additionally, DevSecOps makes the process less stressful for everyone. During the early days of threat modeling, the time-consuming and waterfall-style of threat modeling meant that it was performed at a limited scale and rarely kept current. That often resulted in developers skipping security planning and instead submitting code to the application security (AppSec) team to determine if it was secure enough. Then, the security team would provide a long list of changes that needed to be made. Given their tight deadlines, few developers had time to implement the AppSec team’s robust list of recommendations. Some companies did not have the resources to provide retroactive fixes while also working on new code. In that case, the best defense was to employ traditional threat modeling to try and stop attackers who were seeking to exploit those known vulnerabilities.

DevSecOps has become the gold standard for new threat modeling by proactively preventing threats from occurring in the first place. By making development teams own security, it supports a much stronger security framework than if security was the exclusive responsibility of understaffed AppSec teams. By proactively developing more secure code, normalizing language and modernizing the philosophy of threats, organizations can greatly improve their security posture.

Which raises the question: If modern threat modeling is not the same as classical threat modeling, why call it threat modeling at all?

Adopting a modern threat modeling framework is critical

While the methods have changed, the reason we need to model threats remains the same. Modern modeling still involves identifying and preventing threats, just more proactively. By focusing on DevSecOps, threat modeling aims to prevent problems across the board instead of whichever threat or vulnerability is trending at the time. It is not feasible to predict every new type of malware delivery scheme, but it is possible to eliminate the pathways and vulnerabilities that malware could follow.

This situation is only going to get more precarious. With the development of sophisticated IoT device hacks, cryptocurrency and blockchain scams, plus phishing attacks, companies have more threats to worry about than ever before. To think that a handful of people could predict every method of attack is naive. And while it seems counterintuitive, the best way to protect against modern threats is not to focus directly on the threats at all.

We must also consider that there are other topics pertaining to risk management in software that don’t fit traditional application security models. Modern threat modeling needs to provide developers a prioritized list of mitigations that need to be implemented.

Utilizing a modern, comprehensive, and automated threat modeling framework enables companies to deploy their often limited resources so they can have the biggest impact. Building strong and secure code from the start can even prevent productivity loss by not forcing developers or AppSec teams to retroactively correct vulnerabilities. It will also prevent threat actors from establishing a beachhead to work from, regardless of their methods or attack techniques they employ.

I believe this modern threat modeling framework needs to become the new standard — quickly. No company wants to be known as “the next Equifax” or “the new Colonial Pipeline,” and no shareholder or stakeholder wants to be blindsided by the knowledge that a major systems breach occurred due to poor modeling practices. Companies instead need to focus on DevSecOps, building secure code from the start, and using that platform to create a stronger, more modern foundation and approach to threat modeling.

Credit: Source link

Previous Post

Australian fintech Zepto raises $25M AUD Series A to enhance payment infrastructure – TechCrunch

Next Post

Capital markets fintech Capitolis raises $110m Series D funding

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Capital markets fintech Capitolis raises $110m Series D funding

Capital markets fintech Capitolis raises $110m Series D funding

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Strengthening Cloud Security With Automation

May 22, 2025
How Local IT Services in Anderson Can Boost Your Business Efficiency

Why VPNs Are a Must for Entrepreneurs in Asia

May 22, 2025

Recommended

Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech crypto cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media