Security

Improving DevOps: Shifting Security Right

DevOps discussions invariably center on automation – especially those areas that are deemed bottlenecks to getting products out the door. 47% of DevOps organizations currently automate their deployment, followed closely by the build process (44%) and releasing (41%).[1] The next … Read More

Meltdown and Spectre Addressed by ThreatModeler

With Meltdown and Spectre, 2018 could set a new standard for the “year of the cyber-attack.” Getting on top of these critical vulnerabilities will require enterprise threat modeling.  Meltdown and Spectre, recently discovered hardware vulnerabilities affecting chips produced by Intel, … Read More

Why Implement Enterprise Threat Modeling

Threat modeling for critical and high-risk application security has been a mainstay of software development for nearly a decade. The immediate benefits of application threat modeling include reducing application security risk and lowering production costs as potential threats are identified … Read More

Analyze Endpoint Security with ThreatModeler

The need to analyze endpoint security is becoming an increasing important for organizations. Layered network security defenses are difficult to penetrate. However, once inside the perimeter, legitimate users and adversaries alike have much more freedom of movement. Thus the growing … Read More

Be Prepared for Crash Override with ThreatModeler

The susceptibility of electrical grids around the world came into sharp focus on June 8 as the hacker group known as Electrum used a malware bundle dubbed CRASH OVERRIDE to disrupt power distribution in Kiev, Ukraine. The many similarities of … Read More

Cyber-Physical System Threat Modeling

The rapid expansion of cloud computing capabilities and the Internet of Things has resulted in tremendous advances in cyber-physical systems. A cyber-physical system, or CPS, connects the virtual world with the physical world, allowing greater mobility and freedom for individuals … Read More

Secure Online Banking with Threat Modeling

Financial institutions are consistently in the top-five list of cyber attack targets, with the greatest increase in data breach risk coming from outside hackers.[i] Customer financial records and associated personally identifying information are high-value commodities on the dark web. Nonetheless, consumers … Read More

Better Cloud Security with just One Step

When automobiles first came off Henry Ford’s assembly line, they were a novelty. They were a status symbol for the wealthy who wanted to flaunt their free capital. Few would have believed in those early years that the automobile and … Read More

ThreatModeler’s Caption Contest – What’s Your Smart TV Watching Tonight?

ThreatModeler’s Caption Contest What’s Your Smart TV Watching Tonight? In an effort to educate consumers about the collateral damage that comes from various types of data breaches, we’ve launched a humorous caption contest series to bring more awareness to cybersecurity … Read More

The Enterprise-Level Collateral Damage of a Credit Card Data Breach

Much of the public discussion on cybersecurity and compromised identities has centered on consideration of a credit card data breach – to the point where the public barely raises an eyebrow over new incidences. And indeed, most credit card issuers … Read More