Sep 24, 2019 | Risk Management, Security
In Runtime application self-protection (RASP) emerged in recent years as a way to address application vulnerability issues and to add an extra layer of security to IT infrastructure. RASP is an emerging technology considered part of the Application Security Technology...
Sep 17, 2019 | Attack Surface Analysis, Risk Management, ThreatModeler
Threat, vulnerability and risk are terms that are inherent to cybersecurity. But oftentimes, organizations get their meanings confused. It is crucial for infosec managers to understand the relationships between threats and vulnerabilities so they can effectively...
Aug 25, 2018 | Attack Surface Analysis, Risk Management
The role of the CISO is continuing to evolve. Originally, CISOs were expected to be tech-savvy security subject matter experts. Today, organizations are requiring their CISOs to be business-savvy experts at cyber risk management through attack surface analysis as...
May 1, 2018 | Cyber Risk, Enterprise Threat Modeling, Risk Management, Threat Models
For four years, running cybersecurity and interconnected infrastructure have topped the list of risk sources, according to the results of the 11th Annual Survey of Emerging Risks.[1] Risk sources considered in the survey include climate change, asset price collapse,...
Feb 18, 2018 | Enterprise Threat Modeling, Regulatory Compliance, Risk Management
The scope of cybersecurity will soon include regulatory compliance. Consider the unprecedented security challenges and failures we saw in 2017: 145 million Americans saw their sensitive financial and personal lives become available to the highest dark web bidder...
Oct 31, 2017 | IoT Cybersecurity, Risk Management, Security
Reporters around the globe are writing and watching as IoT security takes another dark turn with a new botnet. The new beast, dubbed IoTroop – sometimes also referred to as Reaper – has the potential to dwarf the infamous Mirai botnet that crippled Dyn last year with...