News
Threat modeling and DevOps: A partnership in the making
Thinking through all the potential threats against an application must start in development. Threat modeling is a structured process that enables IT...
2022 tech predictions: The cloud, infrastructure as code, and the emergence of the metaverse
Issues with rapid migration to the cloud during the pandemic may haunt businesses and organizations over the next year, say cybersecurity experts,...
2022 Threat Predictions: Ransomware, Ransomware, Ransomware
Graduating from being known mostly in the tech and cybersecurity communities, ransomware made the leap into the consciousness of the public at large...
2022 Cybersecurity Predictions: Even More Ransomware, But Reason for Optimism
Cybersecurity experts cite even more ransomware, weaponized vulnerabilities, and new hybrid work and 5G threats among their cybersecurity...
Big Data Industry Predictions for 2022
Predictive analytics will drive new, emerging use cases around the next generation of digital applications. The technology will become more...
Where to do Threat Modeling in a CI/CD Pipeline?
When it comes to developing software, everyone pretty much agrees it’s a good idea to know where the vulnerabilities are in the software BEFORE you...
AWS: reInvent 2021 – Highlights and Some Help
Now that AWS: reInvent 2021 in Las Vegas has wrapped up, it’s time to look back and see what the highlights were. What were the top stories? The #1...
Investing In A Thorough Understanding Of Your Threat Surface
Today, cyberattacks have become a frequent and sobering reality for business leaders and consumers alike. They’ve affected just about every industry...
The Value of Threat Modeling in an Evolving Security Landscape
Even though threat modeling plays a vital role in addressing cyberattacks, many companies were slow to adopt the cybersecurity tool. Threat modeling...