Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Community News
The Inaugural Community-Driven State of Threat Modeling Report
.jpg)
ThreatModCon
A Look Back at ThreatModCon 2025 Barcelona (Slides Inside)

Community News
The First TMC Tokyo Meetup

Community News
Introducing the New Threat Modeling Connect Forum: Your New Space for Collaboration

ThreatModCon
My Experience at ThreatModCon 2024
ThreatModCon
ThreatModCon 2024 San Francisco: Highlights, Slides, and What's Next

ThreatModCon
Recap on ThreatModCon 2023: The First Threat Modeling Conference Ever

Models & Frameworks
Threat Modeling for Simplicity

ThreatModCon
Recap: ThreatModCon 2024 Lisbon

ThreatModCon
Insights from ThreatModCon 2024 Lisbon

Hackathon
Threat Modeling Hackathon Winner 2024

ROI & Value
The Value of Threat Modeling: Three Data Points to Consider

Models & Frameworks
Q&A with Dave Soldera on High Assurance Threat Modeling

Models & Frameworks
Exceptional Threat Modeling

Scope & Scale
Building DevSecOps culture – no one said it would be easy without a Threat Modeling program

Hackathon
Threat Modeling Hackathon Finalist 2023 Threat Model 03

Hackathon
Threat Modeling Hackathon Finalist 2023: Threat Model 02

Hackathon
Threat Modeling Hackathon Winner 2023

ROI & Value
Selling the “Yellow Cow”: How to Sell Threat Modeling to Your Leadership Team Beyond Its Security Benefits

Models & Frameworks
Forget Threat Modeling?!?

Models & Frameworks
The Hitchhiker’s Guide for Failing Threat Modeling

Beginners Guidance
Threat Modeling In Its Right Place

Scope & Scale
Defining Threat Modeling Scope: A Pragmatic Philosophy

Scope & Scale
Becoming the Martian: How to Scale Threat Modeling in Your Organization

Beginners Guidance
Why and When Should We Threat Model

Beginners Guidance
Threat Modeling For Kids: Keep Your Family Safe Online

Beginners Guidance
Is Threat Modeling Worth Your Time and Effort?

Models & Frameworks
Shostack’s Four Question Framework for Threat Modeling

Beginners Guidance
Top 10 Tips for Building an Enterprise Threat Modeling Program