Analyze Endpoint Security

Analyze Endpoint Security with ThreatModeler

The need to analyze endpoint security is becoming an increasing important for organizations. Layered network security defenses are difficult to penetrate. However, once inside the perimeter, legitimate users and adversaries alike have much more freedom of movement. Thus the growing preference for adversarial actors is to conscript the aid of careless or disgruntled insiders –[…]

Prepared for Crash Override

Be Prepared for Crash Override with ThreatModeler

The susceptibility of electrical grids around the world came into sharp focus on June 8 as the hacker group known as Electrum used a malware bundle dubbed CRASH OVERRIDE to disrupt power distribution in Kiev, Ukraine. The many similarities of electrical grids across the world, coupled with the malware’s modular framework, had leaders and electrical[…]

cyber-physical system

Cyber-Physical System Threat Modeling

The rapid expansion of cloud computing capabilities and the Internet of Things has resulted in tremendous advances in cyber-physical systems. A cyber-physical system, or CPS, connects the virtual world with the physical world, allowing greater mobility and freedom for individuals who require interfacing with intelligent devices. For the May Threat Model of the Month, we[…]

secure online banking

Secure Online Banking with Threat Modeling

Financial institutions are consistently in the top-five list of cyber attack targets, with the greatest increase in data breach risk coming from outside hackers.[i] Customer financial records and associated personally identifying information are high-value commodities on the dark web. Nonetheless, consumers expect banks and other financial institutions to provide secure online services and access. Creating sufficiently[…]