Feb 5, 2020 | Attack Surface Analysis, Cloud security, DevOps, Security
In the recent US Securities and Exchange Commission report Cybersecurity and Resiliency Observations, the Office of Compliance Inspections and Examinations outlined the cybersecurity approaches that financial companies implement to improve their security posture. The...
Feb 4, 2020 | CISO, Cloud security, DevOps, IoT Cybersecurity, Security
Thanks to the Internet of Things (IoT) tech, medical devices are increasingly capable of delivering innovative patient care, with monitoring and support around the clock. However, internet-enabled medical devices are also a prime target for hackers who use malware...
Jan 29, 2020 | Recent News, Regulatory Compliance, Risk Management, Security, Threat Models
As we approach the 2020 elections, the U.S. becomes a huge target for digital threats. From election interference to fraud, the need for adequate cybersecurity measures becomes more prevalent than ever. Challenges facing the upcoming elections seem to put the...
Jan 28, 2020 | Comprehensive Attack, Security, Threat Modeling
It’s just the beginning of 2020 and there have been a number of data breaches to raise browse and concern over the state of cybersecurity for the New Year.. The following is a brief summary of some of the most relevant cybersecurity breaches uncovered. From...
Jan 22, 2020 | Security, Threat Modeling
Microsoft has released a critical patch for Windows after the US National Security Agency (NSA) detected a dangerous bug in the operating system. This hazardous vulnerability was already affecting hundreds of millions of computers running Windows 10. The main concern...
Jan 7, 2020 | Methodology, Security, Threat Modeling, Threat Modeling Process, ThreatModeler
When threat modeling methodologies first moved from theory to application in the early 2000s, completing one model for every 40 hours of personnel resource was considered acceptable. Increasingly, internal compliance, external regulatory pressures and financial...