Mar 21, 2022 | Recent News
It seems that just about every application resides in the cloud today. There’s little doubt that these cloud infrastructures need cloud security. But cloud infrastructures are dynamic—they change continuously. So, how do you protect something that’s constantly...
Mar 14, 2022 | Recent News
As threat modeling becomes an integral part of application development, it is interesting to take a look back on its evolution. Here we see that its development represents a continuum from do-it-yourself to one-click threat modeling (almost). Microsoft STRIDE...
Mar 8, 2022 | Recent News
As we detailed in our last post, cars are essentially computers on wheels. And there will soon be a lot of these connected vehicles. According to Juniper Research, by 2025 there will be 206 million automobiles with embedded connectivity, 30 million of which will be...
Feb 28, 2022 | Recent News
We’ve heard someone refer to a Tesla as an iPhone on wheels, and that’s not too far off. Computer chips have been in automobiles for decades—that’ not new. What is new is that automobiles are now connected to the cloud. Just another node on the internet-of-things...
Feb 22, 2022 | Recent News
Just how long can advanced persistent threat last? What is the most complex cyberattack? While the answer is certainly up for debate, a leading candidate has to be APT: advanced persistent threat. A good explanation of APT comes from Cisco. “An advanced persistent...