Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
48% of Companies Plan to Migrate Half or More of Their Apps to the Cloud in 2022
A report on cloud adoption released by O’Reilly Media on Monday found cloud usage among respondents has grown to 90%, while 48% say they plan to...
Does Your Threat Modeling Tool Have This Essential Capability
Until very recently, threat modeling was strictly a proactive technique to identify and mitigate potential threats in an application. Creating the...
Companies Fail to Encrypt, Protect Data in the Cloud
Considering that 40% of organizations have fallen victim to a cloud-based breach in the last year, it would seem they would put a premium on...
TA575 criminal group using ‘Squid Game’ lures for Dridex malware
Cybersecurity firm Proofpoint has found evidence of a prolific cybercrime group using the popularity of Netflix hit "Squid Game" to spread the Dridex...
Teen Rakes in $2.74M Worth of Bitcoin in Phishing Scam
The kid was busted after abusing Google Ads to lure users to his fake gift card site. During the early days of the pandemic, while the rest of the...
Can Threat Modeling Actually Help With Data Governance Too?
When you think about using a threat modeling tool in DevOps or DevSecOps, you think about modeling threats in an effort to make your application...
VPN Exposes Data for 1M Users, Leading to Researcher Questioning
Experts warn that virtual private networks are increasingly vulnerable to leaks and attack. Free virtual private network (VPN) service Quickfox, which...
A Surprising Capability of Threat Modeling in Software Development
When developing software, whether employing the older waterfall methodology or one of the new agile methodologies, everything starts with...
Twitch confirms data exposed in major leak, but “”no indication”” passwords leaked
UPDATE 15/10/21: Twitch has released a further statement with regards to the recent data leak, confirming that passwords have not been exposed. Read...