Oct 8, 2019 | Attack Surface Analysis, Cloud security, Cyber Risk
Penetration testing involves teams who conduct technical and process hacks. Web application penetration testing, for example, involves the enlistment of hackers who see how and where they can accomplish an infiltration. Within the software development lifecycle...
Sep 3, 2019 | Attack Surface Analysis, Cloud security, Cyber Risk, Threat Modeling
SQL injections are a malicious form of cyberattack in which hackers insert malicious code into database servers. SQL injections can take control of applications and compromise security measures. SQL injections are among the oldest, most common forms of web application...
Jul 6, 2018 | Attack Surface Analysis, Cyber Risk, ThreatModeler
Good news for companies: the Total Cost Of Risk (TCOR), a measurement used by the insurance industry and risk managers, continues to decline. Continuing a trend from the previous three years, the average TCOR decreased another 3% in 2017 vs 2016 according to the newly...
May 1, 2018 | Cyber Risk, Enterprise Threat Modeling, Risk Management, Threat Models
For four years, running cybersecurity and interconnected infrastructure have topped the list of risk sources, according to the results of the 11th Annual Survey of Emerging Risks.[1] Risk sources considered in the survey include climate change, asset price collapse,...
Jul 13, 2017 | Cyber Risk, Risk Management
White House Cybersecurity Coordinator Rob Joyce says IoT cybersecurity is a significant issue partially caused by a lack of accountable responsibility for security. The proliferation of unknown IoT devices that connect to or interact with your IT system without...
May 30, 2017 | Cyber Risk, Threat Modeling
The rapid expansion of cloud computing capabilities and the Internet of Things has resulted in tremendous advances in cyber-physical systems. A cyber-physical system, or CPS, connects the virtual world with the physical world, allowing greater mobility and freedom for...