Server on GCS Left Unsecured on the Web, Macy’s and T-Mobile Hacked

Server on GCS Left Unsecured on the Web, Macy’s and T-Mobile Hacked

Approximately 1.2 billion records on an unsecured Google Cloud Services database were found on the web. Vinny Troia, a cybersecurity researcher with a focus on the Dark Web, found 1.2 billion records on an unsecured server. A total of 4 terabytes of personal...
An In Depth Look at ThreatModeling: What Programmers Need to Know

An In Depth Look at ThreatModeling: What Programmers Need to Know

Nowadays, organizations are shifting their focus from DevOps – an approach to the software development life cycle (SDLC), which applies to the origin of a project, through deployment. Within SDLC, the DevSecOps approach integrates security as early as the planning...
Collateral Damage of an Online Membership Data Breach

Collateral Damage of an Online Membership Data Breach

Previously we highlighted the potential harm to individuals that could result from a data breach involving Social Security numbers. Now, let’s consider the potential collateral damage that can occur if your private data is exposed in an online membership information...
Financial Services Moving to the Hybrid Cloud

Financial Services Moving to the Hybrid Cloud

Increasingly, the financial services industry is migrating to the cloud for their content storage needs. Cloud storage occurs in physical storage and can be stored in private, public or hybrid facilities. But before we get detail in the nuances and strategic...
Our Guide to IoT UART Security Protocols

Our Guide to IoT UART Security Protocols

A universal asynchronous receiver/transmitter (UART) is a hardware device with circuitry that facilitates communication between parallel and serial interfaces. These interfaces transmit data, as a single stream of bits, between two systems. Parallel and serial...

ThreatModeler

ThreatModeler revolutionizes threat modeling during the design phase by automatically analyzing potential attack surfaces. Harness our patented functionalities to make critical architectural decisions and fortify your security posture.

Learn more >

CloudModeler

Threat modeling remains essential even after deploying workloads, given the constantly evolving landscape of cloud development and digital transformation. CloudModeler not only connects to your live cloud environment but also accurately represents the current state, enabling precise modeling of your future state

Learn more >

IaC-Assist

DevOps Engineers can reclaim a full (security-driven) sprint with IAC-Assist, which streamlines the implementation of vital security policies by automatically generating threat models through its intuitive designer.

Learn more >