Why it’s Important to Build a Threat Modeling Culture

Why it’s Important to Build a Threat Modeling Culture

There’s a difference between building a threat model and creating a threat modeling culture. To be sure one is part of the other, but to understand the difference requires an analogy. Imagine threat modeling as bodybuilding. Building a threat model would be your...
How to Maximize Your Cybersecurity Budget With Threat Modeling

How to Maximize Your Cybersecurity Budget With Threat Modeling

Everyone who is familiar with threat modeling knows that threat modeling is used to model threats in software applications. And if that’s all threat modeling did, it would still be really useful. But threat modeling can do something just as important. It can tell you...
Secure Online Banking

Secure Online Banking

Financial institutions are consistently in the top-five list of cyber attack targets, with the greatest increase in data breach risk coming from outside hackers.[1] Customer financial records and associated personally identifying information are high-value commodities...
What is SOAR and How Does It Help Secure Enterprises?

What is SOAR and How Does It Help Secure Enterprises?

This is an excerpt from a panel we participated in at the NY Cyber Security Summit. You can check out the entire panel below: Security Orchestration Automation Response (SOAR) refers to security information and event management (SIEM) technology that enables DevOps...
Behind the AWS Shared Responsibility Model and Today’s Cloud Threats

Behind the AWS Shared Responsibility Model and Today’s Cloud Threats

It’s no secret that Amazon Web Services (AWS) helps to run a wide swath of the web’s most popular websites, services, and applications. However, the rise of cloud services has not gone unnoticed by hackers, who have broadened their scope from traditional...