Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

Data Breach Updates

More Than 752,000 US Birth Certificates Leaked, New Orleans Declares a State of Emergency and More

Over 752,000 applications for birth certificate copies were leaked,all because they were not protected with a password in an Amazon Web Services (AWS)...
AWS re:Invent with ThreatModeler

AWS re:Invent 2019 Recap Part Two

It’s been two weeks since AWS re: invent 2019 took place in Las Vegas, Nevada. As the biggest cloud computing conference in the country, Amazon Web...
Social Media Data Breach Collateral Damage

The Collateral Damage of a Social Profile Data Breach

The previous installment in our series on the collateral damage, which a data breach can wreak upon individuals, we considered the profound...
AWS reInvent ThreatModeler recap

AWS re:Invent 2019 Cloud Technology Conference Recap

AWS re:Invent came and went, but not without its fair share of product launches, software updates, and service releases. This year the cloud...
Credit card data breach

Collateral Damage of a Credit Card Data Breach for the Enterprise

A majority of the public discussion on cybersecurity and compromised identities has centered on consideration of a credit card data breach – to the...
Cybersecurity Trends for 2020

Top 10 Cybersecurity Predictions for 2020

We are leaving behind a year that, statistically, was higher than average in cyberattacks and data breaches. As we near the end of 2019, we can look...
Amazon S3 and ThreatModeler

How to Secure Your Amazon S3 File Storage Service

Amazon S3 is the leading and most efficient file storage service offered in the market. S3 is a simple storage service where you can store any kind of...
Serverless AWS Troubleshooting

Most Common Troubleshoot Issues with AWS Serverless Application Repository

Serverless refers to the innate structural design of the cloud that allows users to move more of their active tasks to Amazon Web Services (AWS). The...
How to Deploy Docker containers using Amazon Elastic Container Services and ThreatModeler

Amazon Elastic Container Service: How to Deploy a Docker Container in 5 Easy Steps

Amazon Elastic Container Service (Amazon ECS) consists of a decidedly accessible container management service that enables Docker containers to be...