Illinois ARCS and SUTD received SGD$1.5 million from the CyberSG Research&Development Programme Office to commercialize ThreatMirror.
Our recent workshop examined how cybersecurity threat modeling and safety assurance cases can be better connected through automation and integrated approaches.
From a TED-style talk to valuable business leads, our team shone at SWITCH 2025.
Our time at GovWare 2025 was a resounding success, fuelled by dynamic conversations and valuable industry connections.
Instead of sifting through spreadsheets to guess which threats matter most, ThreatMirror automatically generates attack paths that show how an attacker could move through a client’s system.
Third-party solutions are essential to any system but their increased attack surface poses risks. Discover how threat modeling protects you from potential supply chain compromise attacks.