News
14 Tips For Developing An Effective System For Managing Remote Tech Equipment
When companies and organizations shifted to remote work arrangements in response to the Covid-19 pandemic, leadership teams may have viewed it as a...
Why Threat Modeling is Essential in Evaluating Policy-Driven Security
Policy-driven security makes perfect sense. You’re developing a secure system and you have some compliance requirements it must meet. You start by...
Cyber aggression accusations in hybrid war. Spam texts from your own number. Aviation DDoS incidents. ICS security advisories.
Cyber aggression accusations in hybrid war. Spam texts from your own number. Aviation DDoS incidents. ICS security advisories. Read the full article...
CIRQ Announces ISO 27001 Certification of ThreatModeler Software
The Certification Institute for Research Quality (CIRQ), an International Standards Organization (ISO) audit and certification body that is a...
Why DevOps Teams are Using Threat Modeling to Secure Their Infrastructure as Code
Infrastructure as Code (IaC) sure is convenient. IaC is a way for DevOps teams to deploy and manage application environments through a model, rather...
How Threat Modeling Improves Cloud Infrastructures With Continuous Cloud Security
It seems that just about every application resides in the cloud today. There’s little doubt that these cloud infrastructures need cloud security....
An Overview of the Evolution of Threat Modeling
As threat modeling becomes an integral part of application development, it is interesting to take a look back on its evolution. Here we see that its...
The Regulatory Standard for Cybersecurity in the Automotive Industry
As we detailed in our last post, cars are essentially computers on wheels. And there will soon be a lot of these connected vehicles. According to...
Now That Cars are Computers on Wheels, How do we Protect Them?
We’ve heard someone refer to a Tesla as an iPhone on wheels, and that’s not too far off. Computer chips have been in automobiles for decades—that’...