by threatmodeler1 | May 2, 2022 | Blog
When you think of cyber threats, you probably think about phishing attacks targeted at corporate employees or ransomware aimed at financial institutions. You probably don’t think about a hacker attacking a digital thermometer, but you should. The next great wave of...
by Laura Herrera | Apr 25, 2022 | Blog
The Forbes Magazine has been around since 1917 and we’re guessing this is the first article they’ve ever done on threat modeling. According to its bio, it Forbes magazine features “original articles on finance, industry, investing, and marketing topics.” And while it...
by threatmodeler1 | Apr 18, 2022 | Blog
The good news with deploying applications in the cloud is that you can changes things fast in response to changing demands. The bad news? The same thing: you can change things really fast. And generally speaking, fast changes and security don’t mix very well. Clouds...
by threatmodeler1 | Apr 11, 2022 | Blog
There’s little disagreement that security should be baked into every step of the DevOps lifecycle. In fact, there’s even a name for it: DevSecOps. So, why isn’t its adoption more widespread? Well, as things turn out, there are quite a few challenges to DevOps...
by threatmodeler1 | Apr 4, 2022 | Blog
Policy-driven security makes perfect sense. You’re developing a secure system and you have some compliance requirements it must meet. You start by translating those requirements into a series of security policies with which your system must comply. You then cut loose...
by threatmodeler1 | Mar 28, 2022 | Blog
Infrastructure as Code (IaC) sure is convenient. IaC is a way for DevOps teams to deploy and manage application environments through a model, rather than having to do it manually. And there sure are lots of benefits to deploying infrastructure that way. Benefits...