Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Cybersecurity Threats in the Hotel and Hospitality Industry
Making the decision to stay at a hotel involves a high level of trust. With the advent of Wi-Fi and IoT-embedded devices, e.g. televisions and...
Threat Modeling for Financial Services Security
In the recent US Securities and Exchange Commission report Cybersecurity and Resiliency Observations, the Office of Compliance Inspections and...
Healthcare Cybersecurity Forecast for 2020
Thanks to the Internet of Things (IoT) tech, medical devices are increasingly capable of delivering innovative patient care, with monitoring and...
Threat Modeling Important for Small-and-Midsize Business
According to a 2019 study on the financial impacts of data breaches, small-to-midsize businesses (SMBs) are “acutely” affected, averaging $2.5 million...
CISA Meets NY Elections Officials to Address Security
As we approach the 2020 elections, the U.S. becomes a huge target for digital threats. From election interference to fraud, the need for adequate...
In 2020, Cybersecurity Threats Show No Signs of Slowing Down
It's just the beginning of 2020 and there have been a number of data breaches to raise browse and concern over the state of cybersecurity for the New...
Architecturally-Based Process Flow Diagrams: Examples and Tips to Follow
Threat modeling is catching on. Increasingly, organizations are coming to the realization that securing DevOps projects as early as possible –...
NSA Discloses Details About a Windows Security Flaw
Microsoft has released a critical patch for Windows after the US National Security Agency (NSA) detected a dangerous bug in the operating system. This...
Application Threat Modeling: Guide for CISOs
Application Threat modeling is a structured and methodical approach that allows you to identify potential threats to applications, classify them by...