Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

Thrreatpost logo

Congress Mulls Ban on Big Ransom Payouts Unless Victims Get Official Say-So

A bill introduced this week would regulate ransomware response by the country’s critical financial sector. A U.S. lawmaker has introduced a bill – the...
SC media logo

48% of Companies Plan to Migrate Half or More of Their Apps to the Cloud in 2022

A report on cloud adoption released by O’Reilly Media on Monday found cloud usage among respondents has grown to 90%, while 48% say they plan to...
Does Your Threat Modeling Tool Have This Essential Capability Does Your Threat Modeling Tool Have This Essential Capability

Does Your Threat Modeling Tool Have This Essential Capability

Until very recently, threat modeling was strictly a proactive technique to identify and mitigate potential threats in an application. Creating the...
security boulevard logo

Companies Fail to Encrypt, Protect Data in the Cloud

Considering that 40% of organizations have fallen victim to a cloud-based breach in the last year, it would seem they would put a premium on...
ZD Net logo

TA575 criminal group using ‘Squid Game’ lures for Dridex malware

Cybersecurity firm Proofpoint has found evidence of a prolific cybercrime group using the popularity of Netflix hit "Squid Game" to spread the Dridex...
Thrreatpost logo

Teen Rakes in $2.74M Worth of Bitcoin in Phishing Scam

The kid was busted after abusing Google Ads to lure users to his fake gift card site. During the early days of the pandemic, while the rest of the...
Can Threat Modeling Actually Help With Data Governance Too?

Can Threat Modeling Actually Help With Data Governance Too?

When you think about using a threat modeling tool in DevOps or DevSecOps, you think about modeling threats in an effort to make your application...
Thrreatpost logo

VPN Exposes Data for 1M Users, Leading to Researcher Questioning

Experts warn that virtual private networks are increasingly vulnerable to leaks and attack. Free virtual private network (VPN) service Quickfox, which...
A Surprising Capability Of Threat Modeling In Software Development

A Surprising Capability of Threat Modeling in Software Development

When developing software, whether employing the older waterfall methodology or one of the new agile methodologies, everything starts with...