Basic AWS Threat Model

Creating a Basic AWS Threat Model – Threat Model of the Month

Increasingly organizational IT leaders need to generate greater value from their IT systems. However, in today’s rapidly evolving, highly interconnected cyber ecosystem, attempting to produce that increase through fixed-capacity, on-premises infrastructures and data centers are infeasible. Cloud computing – whether through AWS, Azure, or other providers – provides the flexibility, scalability, and affordability IT leaders[…]

Staying on top of the Threat Landscape

Make Threat Intelligence Actionable

Today’s enterprises receive a myriad of new threat intelligence from multiple feeds and sources. Most organizations highly value such threat intelligence as essential to a strong security posture and fulfilling their security mission. It can be challenging, however, to make threat intelligence actionable. With the plethora of new threats added daily to the cyber ecosystem,[…]

Smart Home Threat Model

Smart Home Threat Model – Threat Model of the Month

Organizations may need to consider a broader cyber ecosystem than their deployed on-premises and cloud-based systems, according to Intel Security’s Christopher Young who addressed the issues at the recent RSA Conference 2017.[i] Smart homes are increasingly becoming a part of organization’s comprehensive attack surface[ii] as more employees take the opportunity to work from home. A[…]

Cyber Risk Management

Attack Surface Analysis the key to Cyber Risk Management

The role of the CISO is continuing to evolve. Originally CISOs were expected to be tech-savvy security subject matter experts. Today organizations are requiring their CISOs to be business-savvy experts at cyber risk management also. Singularly either one of these functions would constitute a full-time challenge. In combination, they would drive even the most proficient[…]