ThreatModeler at AWS re:Invent 2019 in Las Vegas

ThreatModeler at AWS re:Invent 2019 in Las Vegas

For the second year in a row, ThreatModeler will host a sponsored booth at the AWS re:Invent conference in Las Vegas. In an endeavor to build community and raise awareness about its product – including existing capabilities and new enhancements – ThreatModeler...
Collateral Damage of an Online Activities Data Breach

Collateral Damage of an Online Activities Data Breach

In our previous article on data breaches, we considered the potential damage that could result from public exposure of an individual’s membership information. In this article we examine the potential collateral fallout of an online activities data breach. Capturing...
Top Five Ways to Secure Your Workplace Environment From Cybercrime

Top Five Ways to Secure Your Workplace Environment From Cybercrime

With cybercrime at an all-time high, achieving an adequate cybersecurity posture within the workplace is as important as ever. Cybersecurity comprises the people, processes and technology that, taken together, maintain IT systems and applications that are free from...
Designing for Security With Threat Modeling

Designing for Security With Threat Modeling

Within the context of information security, application threat modeling seeks to identify, understand and communicate threat information to security decision makers. Threat modeling can be used to secure system networks, applications, mobile, web, Internet of Things...