threat modeling is a top priority for organizations.<\/a><\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2022-01-14T16:08:08-0500","external_modified_at":"2022-01-14T21:08:09-0500","created_at":"2022-01-14T21:08:11-0500","modified_at":"2022-10-13T12:37:58-0400","published_at":"2022-02-01T00:14:43-0500","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":672786768,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"How SD Elements Automates and Scales Threat Modeling for DevSecOps","description":"SD Elements provides developer-centric automated threat modeling solutions to drive DevSecOps. Learn how (and why) it works in this whitepaper.","seo_title":"How SD Elements Automates and Scales Threat Modeling for DevSecOps","seo_description":"SD Elements automates and scales threat modeling for DevSecOps, which enables organizations to respond to the ever-changing threat landscape. Learn how in this whitepaper.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/how-sd-elements-automates-and-scales-threat-modeling-for-devsecops","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xNDQ3MTQ5JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWM5MjQ3NDZjNzc0ODJjMzZkODA2ZjBkZjEwNDYwMTg3\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1447149","published":null,"draft":null,"source_url":null},"author":{"id":2367133,"first_name":"Security","last_name":"Compass","full_name":"Security Compass","username":"SecurityCompass","email":"uberflip@securitycompass.com","bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2022-01-31T16:56:28-0500","external_modified_at":"2022-01-31T21:56:29-0500","created_at":"2022-01-31T21:56:30-0500","modified_at":"2022-10-13T12:37:58-0400","published_at":"2022-01-31T21:56:28-0500","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":672793446,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Building a Bridge to Security Island","description":"Learn how to establish or run your appsec program smoothly, help your developers maintain the production pipeline without compromising your security posture, and how to ensure the program can scale.","seo_title":"Building a Bridge to Security Island","seo_description":"Learn how to get started on the right foot with your appsec program by learning best practices and avoiding common pitfalls.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/building-a-bridge-to-security-island","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xNDQ3MTg4JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWU3YzQyMjQzYzI1NWRmMjI2NWFjODZmMDllNTU4NWI3\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1447188","published":null,"draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2022-01-31T19:21:47-0500","external_modified_at":"2022-02-01T00:21:47-0500","created_at":"2022-02-01T00:21:49-0500","modified_at":"2022-10-13T12:37:58-0400","published_at":"2022-02-01T00:21:47-0500","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":672899682,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"How to Automate Threat Modeling in a DevSecOps World: A Buyer's Guide","description":"This whitepaper explains how you can anticipate threats earlier in the software development life cycle with the help of automated threat modeling and, as a result, create more secure software.","seo_title":"How to Automate Threat Modeling in a DevSecOps World: A Buyer's Guide","seo_description":"As DevSecOps strategies become more widespread, the role of threat modeling is evolving from simple security technology to defining security risk management processes.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/how-to-automate-threat-modeling-in-a-devsecops-world","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xNDQ3ODIxJnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWQyMWI2MmQwZGMyNzYwZDA2NjRhMWNjNjU0ODE2Yzdj\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1447821","published":null,"draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2022-02-02T18:16:13-0500","external_modified_at":"2022-02-08T00:18:28-0500","created_at":"2022-02-02T23:16:16-0500","modified_at":"2022-10-13T12:37:58-0400","published_at":"2022-02-02T23:16:13-0500","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":674769654,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Speeding Secure Software Development and Attaining Authority to Operate Faster and at Scale in the U.S. Government Agencies","description":"Our experts reveal how to accelerate secure software development and achieve Authority to Operate (ATO) faster and at scale.","seo_title":"Speeding Secure Software Development and Attaining Authority to Operate Faster and at Scale in the U","seo_description":"This whitepaper will take you through the process of secure software development at scale in order to achieve Authority to Operate (ATO) faster.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/speeding-secure-software-development-and-attaining-ato","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xNDU4OTU3JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTY5ZWJhNWJjZjJkMzgzZDEzNmE2NzJkODNhNTU4ZDQ1\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1458957","published":null,"draft":null,"source_url":null},"author":{"id":3935858,"first_name":"Altaz","last_name":"Valani","full_name":"Altaz Valani","username":"avalani@securitycompass.com-del-3935858","email":"avalani@securitycompass.com-del-3935858","bio":"Altaz is the Director of Insights Research and is responsible for managing the overall research vision at Security Compass. Prior to joining SC, he had served as a Senior Research Director and Executive Advisor at Info-Tech Research Group, Senior Manager at KPMG, as well as held various positions working alongside senior stakeholders to drive business value through software development. Valani is on the SAFECode Technical Leadership Council, CIO Strategy Council, the Open Group, and also contributes to several IEEE working groups.","twitter_id":null,"avatar_url":"https:\/\/content.cdntwrk.com\/files\/YV91PTM5MzU4NTgmbW9kaWZpZWQ9MjAyMi0wNS0xMyAxMDo0ODoxNCZzaWc9NTgwNjc2MjYyZjRjZTY4NDYwNDRiZmFjYWEzYTJmMTI%253D"},"hide_publish_date":false,"external_created_at":"2022-03-10T17:35:07-0500","external_modified_at":"2022-03-15T12:04:07-0400","created_at":"2022-03-10T17:35:10-0500","modified_at":"2022-10-13T12:37:58-0400","published_at":"2022-03-10T17:35:07-0500","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":674978139,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Speed and Security: Recent Innovations in Secure Design and Development","description":"This whitepaper discusses the challenges faced while implementing DevSecOps, and how secure software development helps teams overcome these obstacles.","seo_title":"Speed and Security: Recent Innovations in Secure Design and Development","seo_description":"Covering all aspects of a secure software development life cycle, from design through testing, this whitepaper provides a broad, thorough understanding of recent innovations in secure development.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/delivering-both-speed-and-security-through-secure-design-and-development-practices","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xNDYwNTQ0JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTE0ZDNiOTFkNmJkZmQ2MzJmMTcyYWZlZjY0OWNkZjJm\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1460544","published":null,"draft":null,"source_url":null},"author":{"id":3935858,"first_name":"Altaz","last_name":"Valani","full_name":"Altaz Valani","username":"avalani@securitycompass.com-del-3935858","email":"avalani@securitycompass.com-del-3935858","bio":"Altaz is the Director of Insights Research and is responsible for managing the overall research vision at Security Compass. Prior to joining SC, he had served as a Senior Research Director and Executive Advisor at Info-Tech Research Group, Senior Manager at KPMG, as well as held various positions working alongside senior stakeholders to drive business value through software development. Valani is on the SAFECode Technical Leadership Council, CIO Strategy Council, the Open Group, and also contributes to several IEEE working groups.","twitter_id":null,"avatar_url":"https:\/\/content.cdntwrk.com\/files\/YV91PTM5MzU4NTgmbW9kaWZpZWQ9MjAyMi0wNS0xMyAxMDo0ODoxNCZzaWc9NTgwNjc2MjYyZjRjZTY4NDYwNDRiZmFjYWEzYTJmMTI%253D"},"hide_publish_date":false,"external_created_at":"2022-03-15T12:00:00-0400","external_modified_at":"2022-03-15T12:03:41-0400","created_at":"2022-03-15T12:03:42-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2022-03-15T12:00:00-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":675740958,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Report: The Total Economic Impact\u2122 Of Security Compass SD Elements","description":"This report highlights the total economic impact of Security Compass' SD Elements platform \u2014 a comprehensive, best-in-class software-based threat modeling and risk assessment solution.","seo_title":"The Total Economic Impact\u2122 Of Security Compass SD Elements","seo_description":"SD Elements is the most comprehensive cybersecurity risk assessment and threat modeling solution on the market. Learn how much valuable time and money you can save with Security Compass.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/report-on-the-total-economic-impact-of-security-compass-sd-elements","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xNDY0OTM0JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTY0ZWFkN2Y0MGZlYmFiM2U0NDVjMjQ4OWM1MzY2MzVh\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1464934","published":"Security Compass’ SD Elements Platform Delivers 332% ROI According to Independent TEI Study.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2022-04-19T15:15:47-0400","external_modified_at":"2022-04-19T15:18:08-0400","created_at":"2022-04-19T15:18:10-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2022-04-20T10:42:12-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":676017528,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"7 Experts on Attaining ATO Faster in US Government Agencies","description":null,"seo_title":"7 Experts on Attaining ATO Faster in US Government Agencies","seo_description":null,"url":"https:\/\/resources.securitycompass.com\/whitepapers\/7-experts-on-attaining-ato-faster-in-us-government-agencies","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xNDY2OTU1JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWE1YzgxMjMzYjYzODcyMTAwN2UxZjFlODgzZDhmYmJm\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":false,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1466955","published":null,"draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2022-05-05T09:47:27-0400","external_modified_at":"2022-05-05T09:47:29-0400","created_at":"2022-05-05T09:51:19-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2022-05-05T09:47:27-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":676427933,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Complying with Executive Order 14028 Software Security Requirements","description":null,"seo_title":"Complying with Executive Order 14028 Software Security Requirements","seo_description":null,"url":"https:\/\/resources.securitycompass.com\/whitepapers\/complying-with-executive-order-14028-software-security-requirements","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xNDY5MjY5JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTc1MjZlMGNiNThhMWJjMmU0NTc0NTM3MTI0MjhhNjI0\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1469269","published":null,"draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2022-05-31T08:29:29-0400","external_modified_at":"2022-05-31T08:29:30-0400","created_at":"2022-05-31T08:29:30-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2022-05-31T08:29:29-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":0,"featured":false}},{"id":629730329,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Does Your Cyber Insurance Keep You Safe?","description":"Cyber insurance is designed to offset the costs of recovering from a cyberattack. But, it does not relieve you from your security obligations.","seo_title":"Does Your Cyber Insurance Protect You From Cybercrimes?","seo_description":"Cyber insurance is designed to offset the costs of recovering from a cyberattack. But, it does not relieve you from your security obligations.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/does-your-cyber-insurance-keep-you-safe","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMjg2NzA1JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTk2YjdiNTIwYmY5ODI5Y2QxOWNhZWY1ZjA5YWQ4ZWY2\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1286705","published":"
With the cost of breaches skyrocketing, organizations are increasingly turning to cyber insurance policies to limit their financial exposure.<\/p>\n\n
When considering cyber insurance, it is critical to understand that a policy does not relieve an organization of its security obligations.<\/strong> In 2015, a division of insurance giant CNA sued a former client, Cottage Healthcare Systems, to recover a paid claim of more than $4 million. The suit claimed that Cottage Healthcare had not implemented proper security controls, and therefore their claim should not be covered.<\/p>\n\nCyber insurance policies require you to follow at least the minimum practices for software security. Download this whitepaper to learn about common security practices that can prevent cyberattacks.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2020-09-09T11:41:51-0400","external_modified_at":"2020-09-09T15:41:52-0400","created_at":"2020-09-09T15:41:53-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2020-09-09T15:41:51-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":1,"featured":false}},{"id":626235572,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Cybersecurity Talent Shortage: Combining In-House Expertise With Automation","description":"Defending against cyberattacks has never been more difficult than now, yet there's a massive shortage of cybersecurity talent. Learn how you can fill this gap.","seo_title":"How You Can Solve the Cybersecurity Talent Shortage With Automation","seo_description":"Defending against cyberattacks has never been more difficult than now, yet there's a massive shortage of cybersecurity talent. Learn how you can fill this gap.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/cybersecurity-talent-shortage","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMjc5MDM0JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWI0Y2NkMmJlZTA1NjExNjE5MmQ2NmE4NjQyZTJkYTk0\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1279034","published":"
Shortage of security professionals<\/h2>\n\n
Sometimes it seems like the white hats will never get ahead.<\/p>\n\n
Security talent is scarce in organizations of all sizes. ISACA’s State of Cybersecurity 2020 research reports that 62 percent of the respondents<\/a> believe their organizations’ cybersecurity teams are understaffed and 70 percent said fewer than half of cybersecurity applicants are well qualified.<\/p>\n\nWhen security roles can be filled, it is increasingly expensive. Download our whitepaper to learn how you can solve this talent shortage problem through automation.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2020-08-17T09:51:52-0400","external_modified_at":"2020-08-17T13:51:53-0400","created_at":"2020-08-17T13:51:53-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2020-08-17T13:51:52-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":2,"featured":false}},{"id":625698122,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Securing Your Data in the Cloud: Threats and Mitigation","description":"Cloud migrations offer flexibility and many benefits to organizations, but, it also raises concerns about data security. Learn how you can secure your data in the cloud.","seo_title":"Securing Your Data in the Cloud: Threats and Mitigation","seo_description":"Cloud migrations offer flexibility and many benefits to organizations, but, it also raises concerns about data security. Learn how you can secure your data in the cloud.","url":"https:\/\/resources.securitycompass.com\/whitepapers\/securing-your-cloud-data","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMjc4MTA0JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTBkNTI3Zjk5NTQ5ZDBkMDNiNmVjZDNmYjViYWQzMzA1\/-w-320.jpg","canonical_url":null,"canonical_redirect":false,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1278104","published":"
Organizations of all sizes are moving applications to the cloud to leverage shared services and for rapid and elastic scaling. Gartner expects that 80 percent of organizations will shutter their proprietary data centers by 2025.<\/p>\n\n
This is not a new initiative. <\/p>\n\n
Migrating to the cloud, however, raises concerns for data security. Cloud environments are not inherently less (or more) secure than internal data centers. However, moving applications and infrastructure to the cloud requires security teams to consider new threats and risks, including policies, technical risks, and privacy and security regulations.<\/p>\n\n
Download this guide to learn about the threats you face in the cloud environment and how you can mitigate those with the right solution.<\/p>","draft":null,"source_url":null},"author":{"id":null,"first_name":null,"last_name":null,"full_name":null,"username":null,"email":null,"company":null,"bio":null,"twitter_id":null,"avatar_url":null},"hide_publish_date":false,"external_created_at":"2020-08-13T13:45:34-0400","external_modified_at":"2020-08-13T17:45:35-0400","created_at":"2020-08-13T17:45:37-0400","modified_at":"2022-10-13T12:37:58-0400","published_at":"2020-08-13T17:45:34-0400","stream":{"id":4131709,"name":"Guides & Whitepapers","title":"Guides & Whitepapers","ordinal":3,"featured":false}},{"id":623601401,"hub_id":94885,"type":"docs","service":"uberflip","name":null,"title":"Threat Modeling: Finding the Best Approach for Your Organization","description":"The idea behind threat modeling is simple; avoiding software flaws is more secure than fixing vulnerabilities. Learn how you can scale this approach across your organization.","seo_title":"Which Threat Modeling Approach Is the Best for Your Organization?","seo_description":"The idea behind threat modeling is simple; avoiding software flaws is more secure than fixing vulnerabilities. But, can you scale this across your organization?","url":"https:\/\/resources.securitycompass.com\/whitepapers\/best-threat-modeling-approach-for-your-organization","thumbnail_url":"https:\/\/content.cdntwrk.com\/files\/aT0xMjc0NDI5JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTdkNmQ4ZDUyZjYxYjdkNTlhMDg2NTc4MmFiMWEwMGZi\/-w-320.jpg","canonical_url":"https:\/\/resources.securitycompass.com\/reports\/threat-modeling-finding-the-best-approach-for-your-organization","canonical_redirect":true,"mediaproxy_thumbnail_url":null,"avatar_url":null,"duration":null,"published":true,"hidden":false,"edited":true,"deleted":false,"content":{"embed_data":"https:\/\/resources.securitycompass.com\/i\/1274429","published":"