Twitter Is the Latest Victim of a Rapidly-Growing Cybersecurity Threat: Insider Attacks

Twitter Is the Latest Victim of a Rapidly-Growing Cybersecurity Threat: Insider Attacks

Many in the cybersecurity world spend their entire careers trying to prevent the kind of high-profile, reputation-wrecking cyberattack such as what occurred to Twitter earlier this month. On July 15, Twitter users the world over were puzzled to read messages promoting...
How VPCs Work, and How to Integrate Them Into Identity Access Security

How VPCs Work, and How to Integrate Them Into Identity Access Security

While much of the tech world is adopting the private cloud for the added security and scalability, today’s developers typically rely on its public, less secure cousin. The reason is simple: it’s way cheaper. “Private” cloud infrastructure requires providers to assign...
DevSecOps Is Best When Applied in Layers

DevSecOps Is Best When Applied in Layers

By Michael Vizard The best cybersecurity defense is always applied in layers. If one line of defense fails, the next should be able to thwart an attack and so on. That same, tried and true, security in depth concept applies to DevOps as responsibility for...
Addressing the DevSecOps Dysfunction In Your Cloud

Addressing the DevSecOps Dysfunction In Your Cloud

There is a consensus emerging demanding developers to assume more responsibility for security as more organizations embrace best DevSecOps practices and move to the cloud. The trouble is, most organizations aren’t providing the guidance and tools developers need to...
ThreatModeler Launches Free, Lite Community Edition

ThreatModeler Launches Free, Lite Community Edition

As organizations struggle to maintain support of security initiatives during uncertain times, ThreatModeler is contributing its industry leading technology to embolden the DevSecOps community to continuously prioritize the protection of their applications – in minutes...