Why You Should do Threat Modeling to Protect Your APIs

Why You Should do Threat Modeling to Protect Your APIs

When it comes to protecting your attack surface, there’s hardly anything more challenging than APIs. After all, APIs are your way of granting public access to data you’re responsible for protecting. And if you’re going to have a public-facing door to your data, you’d...
Threat Modeling for Critical Infrastructure

Threat Modeling for Critical Infrastructure

It’s not surprising that we have to protect our critical infrastructure from cyberattacks. What might be a surprise is what all constitutes critical infrastructure. There are actually 16 sectors where the United States government has set up critical infrastructure...
Threat Modeling for Manufacturers

Threat Modeling for Manufacturers

Even with software supposedly eating the world, there are still plenty of companies that make physical things. These products may not be as sexy or profitable as software, but they are every bit as essential. From a cybersecurity standpoint, not much has changed in...
Threat Modeling for Retail Organizations

Threat Modeling for Retail Organizations

Threat modeling in the retail industry is a proactive process of identifying, evaluating, and addressing cybersecurity threats. It involves considering potential vulnerabilities in the retail supply chain, from individual stores to associated vendors, to protect...
Threat Modeling for Healthcare Organizations

Threat Modeling for Healthcare Organizations

Threat modeling for healthcare organizations involves systematically identifying, assessing, and addressing potential security risks associated with the storage and transmission of sensitive patient data. This proactive approach helps to protect digital health...
Threat Modeling for Financial Organizations

Threat Modeling for Financial Organizations

Threat modeling in the financial industry is a crucial cybersecurity practice that involves identifying potential threats to assets, particularly financial data and related information. This practice is increasingly essential due to the industry’s attractiveness...
Cybersecurity Tool Bloat—Yeah it’s a Thing

Cybersecurity Tool Bloat—Yeah it’s a Thing

Listen to any cybersecurity tool vendor and they’ll try to convince you of two things. You need their type of product for protection and theirs is the best of breed. And most of them can be very persuasive. The result? Lots of unused (and often unneeded) security...