Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

Educating K-12 and higher education on threat modeling to meet the demands of the cybersecurity field

Why Cybersecurity Must Be a Priority in Education at All Levels

Technology is all around us. From our homes, schools, businesses – even in transit. We rely on technology to ensure, for example that critical...
stalkerware and cyberstalking

Stalkerware Is a Dangerous Threat and Not a Lot Is Being Done About It

Stalkerware is one of the most invasive forms of cybercrime and involves the use of spyware that is freely available on the market. Once installed on...
Coronavirus phishing scams and Google Ads ransomware extortion

Be On the Lookout for Coronavirus Phishing and Google Ads Ransomware Cyberattacks

Hackers Are Using Phishing Tactics to Feed on Coronavirus Fears The recent coronavirus outbreak has triggered a global state of panic. Not only in the...
Save On Data Breach Costs

With the Right Threat Modeling Tool, You Can Save Millions of Dollars

Nowadays, data breaches are a grim reality and a party of the daily grind for organizations – no matter what sector or size. Enterprises are exposed...
ThreatModeler for Kubernetes

Introduction to Kubernetes Container Orchestration

In 2014, Google released Kubernetes, a platform that leverages containerization to run services and applications. Google has since turned Kubernetes...
Top 5 Password Attack Types and How to Prevent Them Copy Of Copy Of Untitled 4

Top 5 Password Attack Types and How to Prevent Them

Password security is no joke. It’s a security measure for the point of entry to personally identifiable information (PII), and confidential, sensitive...
CDLC overview with threat modeling

SDLC vs. CDLC – Why More Organizations Are Turning to the Cloud

Within computer systems engineering, software development lifecycle (SDLC) has been a solid way to create high quality software that meets user...
election cybersecurity

Leveraging Blockchains for Election Cybersecurity

Improving election cybersecurity is becoming increasingly important as recent voter fraud and election hackings continue to shake the nation...
threat modeler hotel security

Cybersecurity Threats in the Hotel and Hospitality Industry

Making the decision to stay at a hotel involves a high level of trust. With the advent of Wi-Fi and IoT-embedded devices, e.g. televisions and...