Mar 12, 2020 | 5G Security, Attack Surface Analysis, Cloud security, IoT Cybersecurity
With the pending dominance Internet of Things (IoT) adoption in business applications, combined with a growing necessity for mobile devices and laptops, the limitations of 4G LTE technology serves as a motivation for mobile network operators to launch enhanced 5G...
Mar 3, 2020 | AWS, Cloud security, Events, Recent News
We came, we saw, we talked threat models. ThreatModeler Software, Inc. hosted a sponsored booth at the RSA Conference held in San Francisco. Great conversations occurred, with people expressing interest in DevSecOps – including how to implement threat modeling to...
Feb 26, 2020 | Cloud security, Recent News, Security
Technology is all around us. From our homes, schools, businesses – even in transit. We rely on technology to ensure, for example that critical infrastructure is provided so we can lead healthy, productive and safe lives. Technology continues to advance, but with new...
Feb 19, 2020 | Cloud security, IoT Cybersecurity, Risk Management, Security
Nowadays, data breaches are a grim reality and a party of the daily grind for organizations – no matter what sector or size. Enterprises are exposed to hackers and malicious insiders daily. As ubiquitous as they are today, threats and vulnerabilities are only...
Feb 18, 2020 | API Security, Cloud security, Cloud Threat Modeling, DevOps, Security
In 2014, Google released Kubernetes, a platform that leverages containerization to run services and applications. Google has since turned Kubernetes into an open source project titled the Cloud Native Computing Foundation. Kubernetes is capable of provisioning and...
Feb 13, 2020 | Attack Surface Analysis, Cloud security, DevOps, Risk Management, Security
Password security is no joke. It’s a security measure for the point of entry to personally identifiable information (PII), and confidential, sensitive information. The first thing anyone should know when creating an account is to never share their password....