May 2, 2022 | Cyber Risk, IoT Cybersecurity, Regulatory Compliance, security controls
When you think of cyber threats, you probably think about phishing attacks targeted at corporate employees or ransomware aimed at financial institutions. You probably don’t think about a hacker attacking a digital thermometer, but you should. The next great wave of...
Oct 8, 2020 | Attack Surface Analysis, AWS, CISO, Cloud security, security controls
The move to cloud poses unique challenges as organizations adapt to securing infrastructure as code for all applications, while being prepared to secure brave new features such as containers, microservices and automatic scaling. Threat modeling, traditionally a manual...