Why You Should do Threat Modeling to Protect Your APIs

Why You Should do Threat Modeling to Protect Your APIs

When it comes to protecting your attack surface, there’s hardly anything more challenging than APIs. After all, APIs are your way of granting public access to data you’re responsible for protecting. And if you’re going to have a public-facing door to your data, you’d...
Threat Modeling for Critical Infrastructure

Threat Modeling for Critical Infrastructure

It’s not surprising that we have to protect our critical infrastructure from cyberattacks. What might be a surprise is what all constitutes critical infrastructure. There are actually 16 sectors where the United States government has set up critical infrastructure...