Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

line of cars in the street

The Regulatory Standard for Cybersecurity in the Automotive Industry

As we detailed in our last post, cars are essentially computers on wheels. And there will soon be a lot of these connected vehicles. According to...
line of cars in the street

Now That Cars are Computers on Wheels, How do we Protect Them?

We’ve heard someone refer to a Tesla as an iPhone on wheels, and that’s not too far off. Computer chips have been in automobiles for decades—that’ not...
keyboard keys

How Threat Modeling Helps Defend Against APT: The Most Complex Cyberattack

Just how long can advanced persistent threat last? What is the most complex cyberattack? While the answer is certainly up for debate, a leading...
dice logo

Insider Threats: Why These Cybersecurity Incidents Continue to Grow

With the rising threat of ransomware and other attacks that originate from outside organizations’ networks, it’s easy to forget the damage that an...
security boulevard logo

Ice Phishing Takes Advantage of Tectonic Shift to Web3

The Badger DAO attack last November and December—during which an attacker stole about $121 million from users—is a good example of “ice phishing” on...
washing examiner logo

A Look at What to Expect in the Cybersecurity World in 2022

Some cybersecurity experts say that complex cybersecurity challenges are coming in 2022, with new types of supply chain-related attacks and attacks...
dice logo

Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes

Cybercriminals are targeting Linux-based servers running Microsoft’s Azure public cloud environment that are vulnerable to flaws after Microsoft...
SC media logo

Cloudflare Launches Public Bug Bounty Program

Cloudflare on Tuesday added a public bug bounty program, the vendor’s first such initiative since the cloud security company started its bug bounty...
dark reading logo

7 Privacy Tips for Security Pros

Track the Data Tom Garrubba, a vice president at Shared Assessments, says privacy is specifically focused on what an organization is permitted to do...