logo
Home Training Labs Integrations Threat Modeling Resources Pricing About us
logo
×
Home Training Labs Integrations Threat Modeling Resources Pricing About us
Understanding the Growing Threat of the Software Supply Chain Attack
Understanding the Growing Threat of the Software Supply Chain Attack

Third-party breaches now account for 30% of all data breaches, double what they were just...

By SecureFlag, on 13 Nov 2025
SecureFlag Introduces New COBOL Labs
SecureFlag Introduces New COBOL Labs

COBOL has been around for over six decades (yes, really) and is still running many...

By SecureFlag, on 11 Nov 2025
SecureFlag Releases Updated OWASP Top 10:2025 Learning Paths
SecureFlag Releases Updated OWASP Top 10:2025 Learning Paths

We have some great news! On November 6th, the final draft of the OWASP Top...

By SecureFlag, on 07 Nov 2025
Overcoming Organizational Security Challenges
Overcoming Organizational Security Challenges

Last year, 93% of enterprises that experienced a breach reported serious consequences, from unplanned downtime...

By SecureFlag, on 04 Nov 2025
Private AWS Cloud Deployment for ThreatCanvas Is Here
Private AWS Cloud Deployment for ThreatCanvas Is Here

We’ve got some good news for teams managing strict data residency and compliance requirements: ThreatCanvas...

By SecureFlag, on 30 Oct 2025
Introducing ThreatCanvas Projects for Unified Threat Modeling
Introducing ThreatCanvas Projects for Unified Threat Modeling

Managing threat models across multiple teams and products can become complex and overwhelming. If there...

By SecureFlag, on 24 Oct 2025
A Short Guide to AI Application Security
A Short Guide to AI Application Security

At the rate AI is expanding, it’s no wonder development and security teams may feel...

By SecureFlag, on 21 Oct 2025
New Learning Path for SOC Analysts on Kerberos Delegation
New Learning Path for SOC Analysts on Kerberos Delegation

How secure is your organization’s Active Directory? One of its most essential features, Kerberos delegation,...

By SecureFlag, on 14 Oct 2025
Threat Modeling Methodology Explained for Developers
Threat Modeling Methodology Explained for Developers

Threat modeling often gets a bad reputation for being slow and disconnected from everyday development,...

By SecureFlag, on 10 Oct 2025
« Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next »
logo Training Labs Integrations Threat Modeling Resources Pricing About us Contact us Privacy Policy
Privacy Policy Copyrights © 2024 SecureFlag Limited.All rights reserved