Sep 3, 2019 | Attack Surface Analysis, Cloud security, Cyber Risk, Threat Modeling
SQL injections are a malicious form of cyberattack in which hackers insert malicious code into database servers. SQL injections can take control of applications and compromise security measures. SQL injections are among the oldest, most common forms of web application...
Aug 27, 2019 | Cloud security, Events, IoT Cybersecurity, Security, Threat Modeling Software
Now in its 22nd year, BlackHat 2019 took place on August 7 and 8 at the Mandalay Bay Convention Center in Las Vegas, Nevada. Joining cyber security experts, hackers, researchers, and vendors, ThreatModeler management attended in full force. This was the first year...
Feb 22, 2019 | Cloud security, Cloud Threat Modeling
As organizations move to the cloud, they recognize security as a requirement to protect their data. Amazon is known as a leading player in the cloud market, founding a secure cloud services platform – Amazon Web Services (AWS). Security during cloud migration is...
Mar 26, 2018 | Cloud security, Enterprise Threat Modeling
Everyone, it seems, is doing it – shifting cash outlay from capex to opex by migrating to the cloud. Those who make the leap to cloud computing see significant benefits. Migrating away from on-premises deployment environments, though, is not an idyllic yellow-brick...
Jun 19, 2017 | Cloud security, Uncategorized
The susceptibility of electrical grids around the world came into sharp focus on June 8 as the hacker group known as Electrum used a malware bundle dubbed CRASH OVERRIDE to disrupt power distribution in Kiev, Ukraine. The many similarities of electrical grids across...
May 4, 2017 | Cloud security, Enterprise Threat Modeling
When automobiles first came off Henry Ford’s assembly line, they were a novelty. They were a status symbol for the wealthy who wanted to flaunt their free capital. Few would have believed in those early years that the automobile and its myriad of gasoline and...