Dec 16, 2019 | CISO, Cloud security, Cloud Threat Modeling, Security, Threat Models
The previous installment in our series on the collateral damage, which a data breach can wreak upon individuals, we considered the profound possibilities of a credit card data breach. This article reviews the potential damages that can occur with a social profile...
Dec 5, 2019 | API Security, AWS, Cloud security, Cloud Threat Modeling, DevSecOps, Security
Amazon S3 is the leading and most efficient file storage service offered in the market. S3 is a simple storage service where you can store any kind of content, e.g. HTML web pages or financial data records. Whatever you store in an S3 bucket is comprised of data. Even...
Oct 2, 2019 | Cloud security, Cloud Threat Modeling
Going serverless means departing from a traditional, on-premise server infrastructure, and migrating to third-party, cloud-hosted applications and services. Serverless is also known as backend as a service (BaaS). When an organization goes serverless, they take...
Sep 24, 2019 | Cloud security, Cloud Threat Modeling
The 21st century has seen many significant technological advancements in the cross-section of digitalization, cybersecurity, and cloud security. As more valuable data is being stored and used to make data-driven decisions, its protection against internal misuse,...
Sep 18, 2019 | Cloud security, Cloud Threat Modeling, DevSecOps, Enterprise DevSecOps, Enterprise Threat Modeling
Increasingly, the financial services industry is migrating to the cloud for their content storage needs. Cloud storage occurs in physical storage and can be stored in private, public or hybrid facilities. But before we get detail in the nuances and strategic...
Feb 22, 2019 | Cloud security, Cloud Threat Modeling
As organizations move to the cloud, they recognize security as a requirement to protect their data. Amazon is known as a leading player in the cloud market, founding a secure cloud services platform – Amazon Web Services (AWS). Security during cloud migration is...