AWS Lambda Features and Security

AWS Lambda Features and Security

As technology advances, so does cybercrime. Hackers find increasingly sophisticated ways to compromise IT systems and applications. Organizations are in a position to take more proactive approaches to cybersecurity. Chief Information Security Officer (CISOs) and...
An In Depth Look at ThreatModeling: What Programmers Need to Know

An In Depth Look at ThreatModeling: What Programmers Need to Know

Nowadays, organizations are shifting their focus from DevOps – an approach to the software development life cycle (SDLC), which applies to the origin of a project, through deployment. Within SDLC, the DevSecOps approach integrates security as early as the planning...
ThreatModeler at DHS Annual Cybersecurity Summit – Bug Bounty Hunters Discussed

ThreatModeler at DHS Annual Cybersecurity Summit – Bug Bounty Hunters Discussed

On Friday, September 20, 2019, the Cyber Tech Accord invited ThreatModeler to speak on its panel appearing at the 2nd Annual Cybersecurity Summit. Alex Bauert, CISSP, CSSLP – ThreatModeler’s Senior Director of Threat Research – sat alongside esteemed Tech Accord panel...