Feb 18, 2020 | API Security, Cloud security, Cloud Threat Modeling, DevOps, Security
In 2014, Google released Kubernetes, a platform that leverages containerization to run services and applications. Google has since turned Kubernetes into an open source project titled the Cloud Native Computing Foundation. Kubernetes is capable of provisioning and...
Feb 12, 2020 | API Security, Cloud security, Cloud Threat Modeling, DevOps, Enterprise DevSecOps
Within computer systems engineering, software development lifecycle (SDLC) has been a solid way to create high quality software that meets user requirements. SDLC phases are designed to be agile, iterative and chronological, clearly defined in plan, design, build,...
Jan 30, 2020 | CISO, Cloud security, DevOps, DevOps Implementation, Threat Modeling
According to a 2019 study on the financial impacts of data breaches, small-to-midsize businesses (SMBs) are “acutely” affected, averaging $2.5 million for data breach remediation. According to the IBM Cost of a Data Breach report (conducted by the Ponemon Institute),...
Jan 16, 2020 | CISO, Cloud security, DevOps, ThreatModeler
Cloud computing is now one of the most pervasive technology trends in technology, as more companies migrate to cloud computing. The cloud continues to gain momentum as more organizations adopt the use of this software service over monolithic applications. In today’s...