Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Amazon Elastic Container Service: How to Deploy a Docker Container in 5 Easy Steps
Amazon Elastic Container Service (Amazon ECS) consists of a decidedly accessible container management service that enables Docker containers to be...
Holiday Cybersecurity Threats: ‘Tis the Season for Cyberattacks, You Need to Be Aware
The holidays come every year and so do heightened threats of a cyber attack during the shopping season. We are re-sharing this article so that you can...
Server on GCS Left Unsecured on the Web, Macy’s and T-Mobile Hacked
Approximately 1.2 billion records on an unsecured Google Cloud Services database were found on the web. Vinny Troia, a cybersecurity researcher with a...
Create a Drone Threat Model to Understand the Impact of a Data Breach
From the hobbyist looking for exciting recreation, to air force commanders coordinating military campaigns, Unmanned Arial Vehicles (UAV) – otherwise...
Importance of Data Integrity and Best Practices
Data integrity is best defined as the accuracy, consistency and reliability of data in transit and at rest. Quality data adheres to a number of...
An In Depth Look at ThreatModeling: What Programmers Need to Know
Nowadays, organizations are shifting their focus from DevOps – an approach to the software development life cycle (SDLC), which applies to the origin...
The Collateral Damage of a Geolocation Information Breach
In our last article in the ThreatModeler series about collateral damage of various types of data breaches, we examined the potential damage that could...
ThreatModeler at AWS re:Invent 2019 in Las Vegas
For the second year in a row, ThreatModeler will host a sponsored booth at the AWS re:Invent conference in Las Vegas. In an endeavor to build...
Threat Modeling and Other Top Tips for Secure API
Application Programming Interfaces (APIs) contribute to a substantial amount of modern software application development. APIs are multidisciplinary...