Jan 28, 2022 | Recent News
Data Privacy Day is not just a day anymore. For the first time, it’s Data Privacy Week — a week-long effort to empower individuals and enterprises worldwide to respect privacy, safeguard data, enable trust, and just as important, raise awareness and promote privacy...
Jan 28, 2022 | Recent News
Data Privacy Day, an international “holiday” that occurs each year on January 28, was created to raise awareness and promote privacy and data protection best practices. The National Cyber Security Alliance (NCSA) assumed leadership of Data Privacy Day from...
Jan 28, 2022 | Recent News
Today is Data Privacy Day — or Data Protection Day, depending on who you talk to — a day dedicated to an international effort to raise awareness about how data is collected, used and stored. Archie Agarwal, founder and CEO at ThreatModeler: A major part of...
Jan 28, 2022 | Recent News
Threat Modeling is the structured practice of identifying and prioritizing potential threats and vulnerabilities, and the prioritization of mitigations to protect assets, including confidential data and intellectual property. Read More
Jan 27, 2022 | Recent News
DevSecOps – short for development, security and operations – combines separate traditional development, security and operations functions to increase the security of applications and digital services Read More
Jan 25, 2022 | Recent News
For all its other security milestones, 2021 was the year that vulnerability disclosures began to get their due, taking on greater importance across all sectors, but particularly in government where valid submissions rose 1,000% and in financial services and software,...
Jan 25, 2022 | Recent News
Question: How does risk modeling work in software improvement? Archie Agarwal, founder and CEO, ThreatModeler: Threat modeling is the method of figuring out potential threats and taking motion to forestall them. We all do that in some kind, from shopping for a greater...
Jan 24, 2022 | Cloud security, DevOps, Recent News
While there is actually a great deal of overlap between threat assessment and threat modeling in terms of their ultimate objective, they are different in terms of their scope. As NIST is quick to point out, “The assessment process is an information-gathering activity,...
Jan 24, 2022 | Recent News
Companies are looking for ways to reduce the risks from cyberattacks and 2022 looks to be the year organizations accept that security must become an adaptable, changeable system within the business and overhaul their legacy static approaches accordingly. Read...
Jan 20, 2022 | Recent News
With great power comes great responsibility. Some cybersecurity professionals choose to use their highly valuable skills for legitimately good causes, as we have recently seen the ethical hacker community come together to assist the Department of Defense and other...