Mar 18, 2020 | Cloud security, Cyber Risk, Enterprise Threat Modeling, IoT Cybersecurity, Regulatory Compliance, Security
The healthcare sector repeatedly battles a high number of data breaches and other cybersecurity issues. According to the 2019 Ponemon Institute-IBM Security report, healthcare corporations pay an estimate of $6.5 million per breach, which accounts for more than 65...
Jan 15, 2020 | Comprehensive Attack, Cyber Risk, Industrial Control System, IoT Cybersecurity, Risk Management, Threat Modeling
Industrial Control Systems (ICS) involve the devices, systems networks, controls and instrumentation that are involved in industrial process control. Entities that utilize ICS systems include power and electric utilities, telecommunications, oil and gas processing and...
Jan 14, 2020 | Cyber Risk, Threat Modeling, Threat Models
Threat modeling is vital for businesses trying to become proactive and deliberate in SDLC and CDLC with adequate application security. Security teams have started the new year planning ahead and discussing potential security risks to their organizations. To secure...
Jan 7, 2020 | Cloud security, Cyber Risk, Recent News, Security, Threat Modeling
Data has become one of the most treasured resources in the world. Businesses that rely on cybernetic technology driven by data are perhaps the most influential companies in the world, triggering continuing discussions about anti-trust regulation, digital privacy and...
Dec 24, 2019 | Cyber Risk, Risk Management, Security
5G structures are the next step in the development of mobile networking. We are about to embark on a next generation system level that emboldens mobile communications with trials and ongoing scale sales. The fifth generation wireless system (5G) seeks to give...
Dec 10, 2019 | Cyber Risk, Security
We are leaving behind a year that, statistically, was higher than average in cyberattacks and data breaches. As we near the end of 2019, we can look toward a new year that can bring many expectations in the continuing cybersecurity war. When it comes to cybersecurity,...