Dec 14, 2018 | Security, Threat Modeling Tools
The primary goal of securing the software development lifecycle (SDLC) is to ensure that requirements are met to prevent security breaches. During the development phase, vulnerabilities and potential threats are identified and tested for security. Application threat...
Mar 16, 2018 | IoT Cybersecurity, Security
Reduced car accidents and congestion, lower energy usage, increased mobility and access to essential and desired information, plus increased productivity are some of the oft-heralded benefits of the ever-expanding IoT-powered ecosystem. With all these new innovations,...
Oct 31, 2017 | IoT Cybersecurity, Risk Management, Security
Reporters around the globe are writing and watching as IoT security takes another dark turn with a new botnet. The new beast, dubbed IoTroop – sometimes also referred to as Reaper – has the potential to dwarf the infamous Mirai botnet that crippled Dyn last year with...
Sep 12, 2017 | Recent News, Security, Threat Modeling
Two out of the big three US credit bureaus, Experian and Equifax, have experienced a significant breach of consumer data in the last two years. On September 2015, Experian reported a breach[1] in which more than 15 million consumer records containing critical...
Aug 28, 2016 | CISO, Risk Management, Security
C-level executives who read the latest Ponemon Institute Cost of Data Breach Study have to think seriously about whether their organization has sufficient cyber risk-mitigation measures in place – including enough cyber insurance. According to the study, the average...