Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
The Regulatory Standard for Cybersecurity in the Automotive Industry
As we detailed in our last post, cars are essentially computers on wheels. And there will soon be a lot of these connected vehicles. According to...
Now That Cars are Computers on Wheels, How do we Protect Them?
We’ve heard someone refer to a Tesla as an iPhone on wheels, and that’s not too far off. Computer chips have been in automobiles for decades—that’ not...
How Threat Modeling Helps Defend Against APT: The Most Complex Cyberattack
Just how long can advanced persistent threat last? What is the most complex cyberattack? While the answer is certainly up for debate, a leading...
Insider Threats: Why These Cybersecurity Incidents Continue to Grow
With the rising threat of ransomware and other attacks that originate from outside organizations’ networks, it’s easy to forget the damage that an...
Ice Phishing Takes Advantage of Tectonic Shift to Web3
The Badger DAO attack last November and December—during which an attacker stole about $121 million from users—is a good example of “ice phishing” on...
A Look at What to Expect in the Cybersecurity World in 2022
Some cybersecurity experts say that complex cybersecurity challenges are coming in 2022, with new types of supply chain-related attacks and attacks...
Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes
Cybercriminals are targeting Linux-based servers running Microsoft’s Azure public cloud environment that are vulnerable to flaws after Microsoft...
Cloudflare Launches Public Bug Bounty Program
Cloudflare on Tuesday added a public bug bounty program, the vendor’s first such initiative since the cloud security company started its bug bounty...
7 Privacy Tips for Security Pros
Track the Data Tom Garrubba, a vice president at Shared Assessments, says privacy is specifically focused on what an organization is permitted to do...