Mar 18, 2020 | Cloud security, Cyber Risk, Enterprise Threat Modeling, IoT Cybersecurity, Regulatory Compliance, Security
The healthcare sector repeatedly battles a high number of data breaches and other cybersecurity issues. According to the 2019 Ponemon Institute-IBM Security report, healthcare corporations pay an estimate of $6.5 million per breach, which accounts for more than 65...
Mar 17, 2020 | Attack Surface Analysis, CISO, Comprehensive Attack, Enterprise Threat Modeling, Security
There is no doubt the internet is a dangerous place as cybercrime becomes the fastest growing type of crime in the US. Cybercrime is increasing in volume, taking more time to resolve and becoming more costly to organizations, according to the Ninth Annual Cost of...
Mar 12, 2020 | 5G Security, Attack Surface Analysis, Cloud security, IoT Cybersecurity
With the pending dominance Internet of Things (IoT) adoption in business applications, combined with a growing necessity for mobile devices and laptops, the limitations of 4G LTE technology serves as a motivation for mobile network operators to launch enhanced 5G...
Mar 3, 2020 | AWS, Cloud security, Events, Recent News
We came, we saw, we talked threat models. ThreatModeler Software, Inc. hosted a sponsored booth at the RSA Conference held in San Francisco. Great conversations occurred, with people expressing interest in DevSecOps – including how to implement threat modeling to...
Feb 27, 2020 | EU GDPR, Risk Management, ThreatModeler
The EU General Data Protection Regulation (GDPR) is the European Union’s upgrade of the current Data Protection Direction. The GDPR is one of the most sweeping overhauls of data protection the world has ever seen. Not only does GDPR come with real teeth – including...
Feb 26, 2020 | Cloud security, Recent News, Security
Technology is all around us. From our homes, schools, businesses – even in transit. We rely on technology to ensure, for example that critical infrastructure is provided so we can lead healthy, productive and safe lives. Technology continues to advance, but with new...
Feb 25, 2020 | Attack Surface Analysis, Recent News, Security
Stalkerware is one of the most invasive forms of cybercrime and involves the use of spyware that is freely available on the market. Once installed on a device, stalkerware, in stealth mode, remains undetected. Here is where stalkerware earned its name and remains one...
Feb 19, 2020 | Cloud security, IoT Cybersecurity, Risk Management, Security
Nowadays, data breaches are a grim reality and a party of the daily grind for organizations – no matter what sector or size. Enterprises are exposed to hackers and malicious insiders daily. As ubiquitous as they are today, threats and vulnerabilities are only...
Feb 18, 2020 | API Security, Cloud security, Cloud Threat Modeling, DevOps, Security
In 2014, Google released Kubernetes, a platform that leverages containerization to run services and applications. Google has since turned Kubernetes into an open source project titled the Cloud Native Computing Foundation. Kubernetes is capable of provisioning and...