News
Data Privacy Day 2022: Views and Tips from Top Industry Experts
Data Privacy Day, an international "holiday" that occurs each year on January 28, was created to raise awareness and promote privacy and data...
Data Privacy Day aims to raise awareness of how we collect and use data
Today is Data Privacy Day -- or Data Protection Day, depending on who you talk to -- a day dedicated to an international effort to raise awareness...
Threat Modeling — The Short Version
Threat Modeling is the structured practice of identifying and prioritizing potential threats and vulnerabilities, and the prioritization of...
What Is DevSecOps?
DevSecOps – short for development, security and operations – combines separate traditional development, security and operations functions to...
Vulnerability Disclosures Rise to Meet Federal Requirements
For all its other security milestones, 2021 was the year that vulnerability disclosures began to get their due, taking on greater importance across...
How Does Threat Modeling Work in Software Development?
Question: How does risk modeling work in software improvement? Archie Agarwal, founder and CEO, ThreatModeler: Threat modeling is the method of...
Threat Assessment vs Threat Modeling: What’s the Difference?
While there is actually a great deal of overlap between threat assessment and threat modeling in terms of their ultimate objective,...
API Security, Ransomware Top 2022 Threats
Companies are looking for ways to reduce the risks from cyberattacks and 2022 looks to be the year organizations accept that security must become an...
515,000 ‘Highly Vulnerable’ People Exposed in Red Cross Cyberattack
With great power comes great responsibility. Some cybersecurity professionals choose to use their highly valuable skills for legitimately good...