Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

Cyber Risk Contribution

Reduce the Cyber Risk Contribution

Good news for companies: the Total Cost Of Risk (TCOR), a measurement used by the insurance industry and risk managers, continues to decline...
Threat modeling as a Service

Threat Modeling as a Service

Fortune 1000 companies increasingly want the benefits of a collaborative, self-serve enterprise threat modeling practice. Quite frankly it is an easy...
Satellite Cybersecurity

Why Satellite Security is Important

Satellite systems are an indispensable part of our cyber ecosystem. We have depended on them almost as long as we depended on shared computing...
Cyber Risk Infrastructure

Cyber Risk from Interconnected Infrastructure

For four years, running cybersecurity and interconnected infrastructure have topped the list of risk sources, according to the results of the 11th...
Cyber threats

Responding to New Cyber Threats

How does your organization respond to new cyber threats? Standard enterprise operating practice when a new cyber threat appears follows a familiar...
Cloud Computing Security

Cloud Computing Security for Entertainment

Everyone, it seems, is doing it – shifting cash outlay from capex to opex by migrating to the cloud. Those who make the leap to cloud computing see...
IoT Cybersecurity

IoT Cybersecurity: Keeping Pace with Innovation

Reduced car accidents and congestion, lower energy usage, increased mobility and access to essential and desired information, plus increased...
Regulatory Compliance

Cybersecurity and Regulatory Compliance

The scope of cybersecurity will soon include regulatory compliance. Consider the unprecedented security challenges and failures we saw in 2017: 145...
Enterprise threat modeling

Implementing Enterprise Threat Modeling

Understanding that enterprise threat modeling is the gold standard of threat modeling, enabling CISOs can drive consistent security policy...