Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Threat Modeling for Financial Services Security
In the recent US Securities and Exchange Commission report Cybersecurity and Resiliency Observations, the Office of Compliance Inspections and...
Healthcare Cybersecurity Forecast for 2020
Thanks to the Internet of Things (IoT) tech, medical devices are increasingly capable of delivering innovative patient care, with monitoring and...
Threat Modeling Important for Small-and-Midsize Business
According to a 2019 study on the financial impacts of data breaches, small-to-midsize businesses (SMBs) are “acutely” affected, averaging $2.5 million...
CISA Meets NY Elections Officials to Address Security
As we approach the 2020 elections, the U.S. becomes a huge target for digital threats. From election interference to fraud, the need for adequate...
In 2020, Cybersecurity Threats Show No Signs of Slowing Down
It's just the beginning of 2020 and there have been a number of data breaches to raise browse and concern over the state of cybersecurity for the New...
Architecturally-Based Process Flow Diagrams: Examples and Tips to Follow
Threat modeling is catching on. Increasingly, organizations are coming to the realization that securing DevOps projects as early as possible –...
NSA Discloses Details About a Windows Security Flaw
Microsoft has released a critical patch for Windows after the US National Security Agency (NSA) detected a dangerous bug in the operating system. This...
Application Threat Modeling: Guide for CISOs
Application Threat modeling is a structured and methodical approach that allows you to identify potential threats to applications, classify them by...
Secure Your CDLC with Threat Modeling
Cloud computing is now one of the most pervasive technology trends in technology, as more companies migrate to cloud computing. The cloud continues to...