<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Podcast: Using Automation and Threat Modeling to Protect Your Network

Greg Mooney| December 30 2019

| Podcasts, security

podcast-using-automation-and-threat-modeling-to-protect-your-network

Proper security hygiene is impossible without some form of automation. Too many hours are wasted due to manual effort when security and IT teams could be spending time on more critical issues.

IT teams today are dealing with the impossible task of protecting their business from the growing security threats. Every application, cloud service, hardware, device, and even 3rd party plugins on a website need to be put under scrutiny to determine where security loopholes are for potential external threats.

Most companies fail to grapple with these issues due to the magnitude of apps and devices connected to their IT stack. But every day, tools are becoming available to help IT tackle these threats. Automation, for instance, is becoming a business-critical for IT and Security teams to help better understand the attack surface area of their networks.

ThreatModeler is helping IT grapple with the constant and growing issue that is maintaining secure business networks. They are doing this by implementing automation in conjunction with threat modeling. For the uninitiated, threat modeling is the process of providing IT and security teams the means to understand their attack surface via systematic analysis of a business network.

Predicting Security Issues with Threat Modeling and Automation

Alex Bauert, Senior Director of Threat Research at ThreatModeler, joined the Defrag This podcast to discuss how THreatModeler is helping IT teams by  automating much of the security tasks at hand. The idea is to use automation in conjunction with threat modeling to identify and predict threats across the entire attack surface on a network. In turn, this allows IT and security teams to be proactive and mitigate risk across the whole business network.

“Part of the challenge with threat modeling has been the amount of manual effort with a very limited, return/deliverable out of it. It’s kind of a single event, and you're done.” Alex states.

This is where to ROI of implementing automation is extremely important. IT can then spend more time writing tests, setting configurations, and really focusing on staying ahead of issues. These issues could be addressing zero-days, updating critical systems, and increasing operation/workflow efficiency.

In conclusion, a combination of threat modeling and automation can go a long way. Listen to the podcast above, and let us know what your thoughts are on threat modeling and automation as it relates to cybersecurity.

Topics: Podcasts, security

Leave a Reply

Your email address will not be published. Required fields are marked *

THIS POST WAS WRITTEN BY Greg Mooney

Greg is a technologist and data geek with over 10 years in tech. He has worked in a variety of industries as an IT manager and software tester. Greg is an avid writer on everything IT related, from cyber security to troubleshooting.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters. 

Send us a note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.