Oct 8, 2019 | Attack Surface Analysis, Cloud security, Cyber Risk
Penetration testing involves teams who conduct technical and process hacks. Web application penetration testing, for example, involves the enlistment of hackers who see how and where they can accomplish an infiltration. Within the software development lifecycle...
Oct 2, 2019 | Cloud security, Cloud Threat Modeling
Going serverless means departing from a traditional, on-premise server infrastructure, and migrating to third-party, cloud-hosted applications and services. Serverless is also known as backend as a service (BaaS). When an organization goes serverless, they take...
Sep 25, 2019 | Cloud security, Threat Modeling
The 21st century has seen many significant technological advancements in the cross-section of digitalization, cybersecurity, and cloud security. As more valuable data is being stored and used to make data-driven decisions, its protection against internal...
Sep 24, 2019 | Cloud security, Cloud Threat Modeling
The 21st century has seen many significant technological advancements in the cross-section of digitalization, cybersecurity, and cloud security. As more valuable data is being stored and used to make data-driven decisions, its protection against internal misuse,...
Sep 18, 2019 | Cloud security, Cloud Threat Modeling, DevSecOps, Enterprise DevSecOps, Enterprise Threat Modeling
Increasingly, the financial services industry is migrating to the cloud for their content storage needs. Cloud storage occurs in physical storage and can be stored in private, public or hybrid facilities. But before we get detail in the nuances and strategic...
Sep 12, 2019 | AWS, Cloud security, Methodology
For organizations looking to improve on operational efficiencies, more and more CIOs are migrating to the cloud. Amazon Web Services (AWS) is one of the most trusted, reliable cloud service providers with the Amazon Virtual Private Cloud. In order to build an AWS...