by threatmodeler1 | May 2, 2022 | Blog
When you think of cyber threats, you probably think about phishing attacks targeted at corporate employees or ransomware aimed at financial institutions. You probably don’t think about a hacker attacking a digital thermometer, but you should. The next great wave of...
by threatmodeler1 | Apr 18, 2022 | Blog
The good news with deploying applications in the cloud is that you can changes things fast in response to changing demands. The bad news? The same thing: you can change things really fast. And generally speaking, fast changes and security don’t mix very well. Clouds...
by threatmodeler1 | Apr 11, 2022 | Blog
There’s little disagreement that security should be baked into every step of the DevOps lifecycle. In fact, there’s even a name for it: DevSecOps. So, why isn’t its adoption more widespread? Well, as things turn out, there are quite a few challenges to DevOps...
by threatmodeler1 | Apr 4, 2022 | Blog
Policy-driven security makes perfect sense. You’re developing a secure system and you have some compliance requirements it must meet. You start by translating those requirements into a series of security policies with which your system must comply. You then cut loose...
by threatmodeler1 | Mar 28, 2022 | Blog
Infrastructure as Code (IaC) sure is convenient. IaC is a way for DevOps teams to deploy and manage application environments through a model, rather than having to do it manually. And there sure are lots of benefits to deploying infrastructure that way. Benefits...