It seems that just about every application resides in the cloud today. There’s little doubt that these cloud infrastructures need cloud security. But cloud infrastructures are dynamic—they change continuously. So, how do you protect something that’s constantly...
As threat modeling becomes an integral part of application development, it is interesting to take a look back on its evolution. Here we see that its development represents a continuum from do-it-yourself to one-click threat modeling (almost). Microsoft STRIDE...
As we detailed in our last post, cars are essentially computers on wheels. And there will soon be a lot of these connected vehicles. According to Juniper Research, by 2025 there will be 206 million automobiles with embedded connectivity, 30 million of which will be...
We’ve heard someone refer to a Tesla as an iPhone on wheels, and that’s not too far off. Computer chips have been in automobiles for decades—that’ not new. What is new is that automobiles are now connected to the cloud. Just another node on the internet-of-things...
Just how long can advanced persistent threat last? What is the most complex cyberattack? While the answer is certainly up for debate, a leading candidate has to be APT: advanced persistent threat. A good explanation of APT comes from Cisco. “An advanced persistent...