Dec 10, 2019 | Cyber Risk, Security
We are leaving behind a year that, statistically, was higher than average in cyberattacks and data breaches. As we near the end of 2019, we can look toward a new year that can bring many expectations in the continuing cybersecurity war. When it comes to cybersecurity,...
Dec 5, 2019 | API Security, AWS, Cloud security, Cloud Threat Modeling, DevSecOps, Security
Amazon S3 is the leading and most efficient file storage service offered in the market. S3 is a simple storage service where you can store any kind of content, e.g. HTML web pages or financial data records. Whatever you store in an S3 bucket is comprised of data. Even...
Dec 3, 2019 | Enterprise Threat Modeling, Security, Threat Modeling
Amazon Elastic Container Service (Amazon ECS) consists of a decidedly accessible container management service that enables Docker containers to be effortlessly managed on a group of servers known as clusters. Users can host their cluster on a serverless foundation...
Nov 20, 2019 | Security, Threat Models
From the hobbyist looking for exciting recreation, to air force commanders coordinating military campaigns, Unmanned Arial Vehicles (UAV) – otherwise known as drones – have permeated our everyday lives. As one might expect, where there’s emerging technology based on...