Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Threat Assessment vs Threat Modeling: What’s the Difference?
While there is actually a great deal of overlap between threat assessment and threat modeling in terms of their ultimate objective, they are different...
API Security, Ransomware Top 2022 Threats
Companies are looking for ways to reduce the risks from cyberattacks and 2022 looks to be the year organizations accept that security must become an...
515,000 ‘Highly Vulnerable’ People Exposed in Red Cross Cyberattack
With great power comes great responsibility. Some cybersecurity professionals choose to use their highly valuable skills for legitimately good causes...
Red Cross Cyberattack Compromises Highly Vulnerable People’s Data
In a particularly low blow, a Red Cross cyberattack compromised personal data and confidential information of more than 515,000 highly vulnerable...
Darkest Before The Dawn: Expectations For The Year Ahead
With transition comes turbulence. Never has this been more obvious and widespread than with IT infrastructures over the last 18 months. Remote work...
Data Privacy: What Technologists Should Know in 2022
Ever since EU lawmakers enacted the block’s groundbreaking General Data Protection Regulation (GDPR) framework in May 2018, data privacy laws have...
A Cybersecurity Checklist for the New Year
When it comes to a cybersecurity checklist, admittedly you could have just a single item on your list: Identify your risks and mitigate them. In some...
Cloud Migration, Zero-Trust Architecture and Ransomware: The Year Ahead
IT infrastructure has been in a period of intense transition, exacerbated widely by the global disruptions brought on by the events of the past two...
Are You Ready for These 2022 Cyber Threats?
A new year, a new set of cyber threats. Are you prepared? The only thing we know for sure is that cybercriminals will never stop. In this article...