Nov 26, 2019 | Threat Modeling
Approximately 1.2 billion records on an unsecured Google Cloud Services database were found on the web. Vinny Troia, a cybersecurity researcher with a focus on the Dark Web, found 1.2 billion records on an unsecured server. A total of 4 terabytes of personal...
Nov 19, 2019 | Cloud security, DevSecOps
Nowadays, organizations are shifting their focus from DevOps – an approach to the software development life cycle (SDLC), which applies to the origin of a project, through deployment. Within SDLC, the DevSecOps approach integrates security as early as the planning...
Sep 18, 2019 | Cloud security, Cloud Threat Modeling, DevSecOps, Enterprise DevSecOps, Enterprise Threat Modeling
Increasingly, the financial services industry is migrating to the cloud for their content storage needs. Cloud storage occurs in physical storage and can be stored in private, public or hybrid facilities. But before we get detail in the nuances and strategic...
Sep 11, 2019 | Endoint Security, Industrial Control System, IoT Cybersecurity
A universal asynchronous receiver/transmitter (UART) is a hardware device with circuitry that facilitates communication between parallel and serial interfaces. These interfaces transmit data, as a single stream of bits, between two systems. Parallel and serial...