Feb 19, 2020 | Cloud security, IoT Cybersecurity, Risk Management, Security
Nowadays, data breaches are a grim reality and a party of the daily grind for organizations – no matter what sector or size. Enterprises are exposed to hackers and malicious insiders daily. As ubiquitous as they are today, threats and vulnerabilities are only...
Feb 18, 2020 | API Security, Cloud security, Cloud Threat Modeling, DevOps, Security
In 2014, Google released Kubernetes, a platform that leverages containerization to run services and applications. Google has since turned Kubernetes into an open source project titled the Cloud Native Computing Foundation. Kubernetes is capable of provisioning and...
Feb 13, 2020 | Attack Surface Analysis, Cloud security, DevOps, Risk Management, Security
Password security is no joke. It’s a security measure for the point of entry to personally identifiable information (PII), and confidential, sensitive information. The first thing anyone should know when creating an account is to never share their password....
Feb 10, 2020 | Recent News, Security, Threat Modeling
Improving election cybersecurity is becoming increasingly important as recent voter fraud and election hackings continue to shake the nation. Innovators and security organizations are looking into the endless possibilities of applying blockchains to enhance election...
Feb 6, 2020 | Attack Surface Analysis, IoT Cybersecurity, Risk Management, Security
Making the decision to stay at a hotel involves a high level of trust. With the advent of Wi-Fi and IoT-embedded devices, e.g. televisions and refrigerators, today’s hotels need to protect their guest’s data security just as they do their physical belongings. It is no...