Architectural & Data-Flow Diagramming Available in IriusRisk

 | Continuum Blog

With the new release of IriusRisk – detailed here – we’re proud to announce architectural and data-flow diagramming.

Security teams can now view automatically generated threat model architecture and add new components and data-flows from within the Diagramming view.

Architectural diagramming is under continued development and planned for future releases includes the ability to export the diagram as an image and add it to reports.

For a short demonstration of diagramming capabilities and processes, please watch the below video:

Did you like this article?

YOU MAY ALSO LIKE
  • Why invest in a threat modeling tool?
    Why invest in a threat modeling tool?Over on the Leviathan Security blog Crispin Cowan pens his thoughts on the “Calculus of Threat Modelling” within which he makes this comment: There are many threat modeling tools available, but they are really just substitutes for threat modeling best practice, which is for a threat modeling expert to meet with engineers who are experts on the […]READ MORE
  • Continuum Security Interview with Adam Shostack
    Continuum Security Interview with Adam ShostackAt the recent Open Security Summit we had the great pleasure of interviewing Adam Shostack about his keynote presentation “A seat at the table” and the challenge of getting security involved in product and application design. We covered numerous topics from the benefits brought to business by threat modeling to pooping unicorns. Adam is a member of our […]READ MORE
  • Continuum Security Silver Sponsors of the OWASP AppSec EU Conference
    Continuum Security Silver Sponsors of the OWASP AppSec EU ConferenceWe are thrilled to announce we are silver sponsors of the upcoming OWASP AppSec Europe conference due to take place in London 2nd – 6th July. Here’s a little about the conference: The premier application security conference for European developers and security experts. AppSec EU provides attendees with insight into leading speakers for application security […]READ MORE