Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Microsoft hires Sequoia-backed AI collaboration platform team Cove

Cyberattack on vehicle breathalyzer company leaves drivers stranded in US

AI startups are eating up the venture industry, and the returns, so far, are good

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Microsoft is retiring some of the Copilot AI bloat on Windows

    21 March 2026

    The best AI investment may be in energy technology

    20 March 2026

    Bot traffic to overtake human traffic by 2027, says Cloudflare CEO

    20 March 2026

    Multiverse Computing is pushing its compressed AI models into the mainstream

    19 March 2026

    Sam Altman’s thank you to coders draws memes

    19 March 2026
  • Apps

    Google is introducing a new way for users to download Android apps that still protects against fraud

    21 March 2026

    Meta launches new AI content enforcement systems while reducing reliance on third-party vendors

    20 March 2026

    Bluesky Announces $100M Series B After CEO Transition

    20 March 2026

    Amazon is bringing Alexa+ to the UK

    19 March 2026

    Rebel Audio is a new AI podcasting tool aimed at first-time creators

    19 March 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    Amid legal turmoil, Kalshi is temporarily banned in Nevada

    20 March 2026

    Nominations for the Startup Battlefield 200 are still open

    19 March 2026

    Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

    17 March 2026

    Fuse raises $25M to disrupt legacy loan origination systems used by US credit unions

    16 March 2026

    India neobank Fi removes banking services on its platform

    11 March 2026
  • Hardware

    Amazon is working on a new smartphone with Alexa at its core, the report says

    20 March 2026

    CEO Carl Pei says nothing about smartphone apps disappearing as they’re replaced by artificial intelligence agents

    18 March 2026

    MacBook Neo, AirPods Max 2, iPhone 17e and everything else Apple announced this month

    18 March 2026

    Oura enters India’s smart ring market with Ring 4

    17 March 2026

    Apple quietly launches AirPods Max 2

    17 March 2026
  • Media & Entertainment

    Tubi joins forces with popular TikTokers to create original streaming content

    19 March 2026

    Patreon CEO calls AI companies’ fair use argument ‘bogus’, says creators should be paid

    18 March 2026

    Meet Vurt, the first mobile streaming platform for indie filmmakers embracing vertical video

    18 March 2026

    BuzzFeed debuts AI applications for new revenue

    17 March 2026

    Facebook makes it easy for creators to report copycats

    14 March 2026
  • Security

    The US accuses the Iranian government of operating a hacktivist group that hacked the Stryker

    20 March 2026

    CISA Urges Companies to Secure Microsoft Intune Systems After Hackers Mass Wipe Stryker Devices

    20 March 2026

    FBI seizes websites of pro-Iranian hacker group after devastating Stryker attack

    19 March 2026

    FBI is buying location data to track US citizens, director confirms

    19 March 2026

    Russians caught stealing personal data from Ukrainians with new advanced iPhone hacking tools

    18 March 2026
  • Startups

    Microsoft hires Sequoia-backed AI collaboration platform team Cove

    21 March 2026

    Consumer-focused privacy firm Cloaked raises $375 million as it expands into the enterprise

    20 March 2026

    Tools for founders to navigate and move past conflicts

    20 March 2026

    Anori, Alphabet’s new X spinout, faces one of the world’s most expensive bureaucratic nightmares

    19 March 2026

    This startup wants to make enterprise software more like a prompt

    19 March 2026
  • Transportation

    Cyberattack on vehicle breathalyzer company leaves drivers stranded in US

    21 March 2026

    Arc expands into electric commercial and defense vessels with $50M raise

    20 March 2026

    Rivian Sacrifices 2027 Profit Target to Push Deeper into Autonomy

    20 March 2026

    K2 will launch its first high-powered computing satellite into space

    19 March 2026

    EV startup Harbinger unveils smaller work truck with electric and hybrid variants

    18 March 2026
  • Venture

    AI startups are eating up the venture industry, and the returns, so far, are good

    21 March 2026

    Sequen raised $16 million to bring TikTok-style personalization technology to any consumer company

    19 March 2026

    AI ‘boys club’ could widen wealth gap for women, says Rana el Kaliouby

    18 March 2026

    Billionaires made a promise – now some want to leave

    17 March 2026

    Antonio Gracias Says He Longs For ‘Pre-Entropic’ Startups – Those Built To Survive Chaos

    17 March 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»A startup’s guide to cyber threats — threat modeling and proactive security
Security

A startup’s guide to cyber threats — threat modeling and proactive security

techtost.comBy techtost.com11 January 202402 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
A Startup's Guide To Cyber Threats — Threat Modeling And
Share
Facebook Twitter LinkedIn Pinterest Email

Cherlynn Cha is the security operations center manager at ExpressVPN. With her expertise in threat hunting, incident response, cloud security, automation and brand protection, Cherlynn plays a critical role in protecting the security and privacy of ExpressVPN’s more than 4 million subscribers worldwide.

In today’s interconnected in the world, cyber threats are everywhere and always changing. Startups cannot afford to ignore the importance of securing their digital infrastructure. Waiting until a security breach occurs can lead to serious consequences, including financial losses and reputational damage.

ExpressVPN recently partnered with Linking Help, the NGO behind UA.SUPPORT that provides pro bono legal support to Ukrainian refugees, to conduct threat modeling analysis. The goal was to identify security concerns and provide effective mitigation measures. Inspired by this experience, I want to share our methodology with the wider community and empower you to improve your security posture — even with limited resources and other business pressures.

Exploit disclosure with threat modeling

Threat modeling is a key practice in strengthening digital defenses. Simply put, it involves understanding and knowing your organization so that others cannot harm you. The goal is to increase awareness of security gaps and minimize the risk of potential exploits by systematically analyzing potential avenues of abuse.

There are various threat modeling standards and frameworks, and the right choice for you depends on your specific framework. Rather than telling you which one to use, we’ll focus on the underlying methodology we used to conduct threat modeling for UA.SUPPORT, thereby creating effective and practical security recommendations.

Actionable security strategies for startup resilience

1. Know your enemy

Cybersecurity is a complex and multifaceted field, and even with thorough threat modeling, there is always the risk of compromise.

Identifying potential adversaries and their targets is critical to assessing why and how you might be targeted. For example, cybercriminals often target systems that handle credit cards or personally identifiable information (PII), while nation-state adversaries may be interested in information for espionage or intelligence purposes.

In the case of UA.SUPPORT, potential rivals included:

  • Advanced opponents, who have the following objectives:

○ Collection of information about people from Ukraine.

○ Compromise systems to gain unauthorized access, collect sensitive information, or conduct espionage activities.

○ Disrupting the organization’s platform to hinder its ability to help vulnerable people.

  • Opportunistic cybercriminals, who target:
Column Column EC Cyber EC cyber security EC How to guide modeling proactive security startups threat threats
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMy note adds some pill-zazz to the vending machines
Next Article Amazon Prime Video and MGM Studios laid off hundreds of employees
bhanuprakash.cg
techtost.com
  • Website

Related Posts

AI startups are eating up the venture industry, and the returns, so far, are good

21 March 2026

The US accuses the Iranian government of operating a hacktivist group that hacked the Stryker

20 March 2026

CISA Urges Companies to Secure Microsoft Intune Systems After Hackers Mass Wipe Stryker Devices

20 March 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Microsoft hires Sequoia-backed AI collaboration platform team Cove

21 March 2026

Cyberattack on vehicle breathalyzer company leaves drivers stranded in US

21 March 2026

AI startups are eating up the venture industry, and the returns, so far, are good

21 March 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Amid legal turmoil, Kalshi is temporarily banned in Nevada

20 March 2026

Nominations for the Startup Battlefield 200 are still open

19 March 2026

Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

17 March 2026
Startups

Microsoft hires Sequoia-backed AI collaboration platform team Cove

Consumer-focused privacy firm Cloaked raises $375 million as it expands into the enterprise

Tools for founders to navigate and move past conflicts

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.