Feb 12, 2020 | API Security, Cloud security, Cloud Threat Modeling, DevOps, Enterprise DevSecOps
Within computer systems engineering, software development lifecycle (SDLC) has been a solid way to create high quality software that meets user requirements. SDLC phases are designed to be agile, iterative and chronological, clearly defined in plan, design, build,...
Feb 5, 2020 | Attack Surface Analysis, Cloud security, DevOps, Security
In the recent US Securities and Exchange Commission report Cybersecurity and Resiliency Observations, the Office of Compliance Inspections and Examinations outlined the cybersecurity approaches that financial companies implement to improve their security posture. The...
Feb 4, 2020 | CISO, Cloud security, DevOps, IoT Cybersecurity, Security
Thanks to the Internet of Things (IoT) tech, medical devices are increasingly capable of delivering innovative patient care, with monitoring and support around the clock. However, internet-enabled medical devices are also a prime target for hackers who use malware...
Jan 30, 2020 | CISO, Cloud security, DevOps, DevOps Implementation, Threat Modeling
According to a 2019 study on the financial impacts of data breaches, small-to-midsize businesses (SMBs) are “acutely” affected, averaging $2.5 million for data breach remediation. According to the IBM Cost of a Data Breach report (conducted by the Ponemon Institute),...
Jan 16, 2020 | CISO, Cloud security, DevOps, ThreatModeler
Cloud computing is now one of the most pervasive technology trends in technology, as more companies migrate to cloud computing. The cloud continues to gain momentum as more organizations adopt the use of this software service over monolithic applications. In today’s...
Jan 7, 2020 | Cloud security, Cyber Risk, Recent News, Security, Threat Modeling
Data has become one of the most treasured resources in the world. Businesses that rely on cybernetic technology driven by data are perhaps the most influential companies in the world, triggering continuing discussions about anti-trust regulation, digital privacy and...