Apr 22, 2020 | Attack Surface Analysis, Cloud security, Recent News
Technology continues to evolve at lightning speed, and hackers are working as fast as they can to manifest the latest cybersecurity threat. In this era of cyber disruption, keeping up with cybersecurity news is a must these days – for organizations and consumers...
Mar 24, 2020 | CISO, Security
With cybersecurity becoming a crucial part of a successful technology development life cycle, it cannot be stressed enough the significance of reporting. For CISOs, reporting is a crucial part of the puzzle, and provides a tangible way for development, security and...
Jan 30, 2020 | CISO, Cloud security, DevOps, DevOps Implementation, Threat Modeling
According to a 2019 study on the financial impacts of data breaches, small-to-midsize businesses (SMBs) are “acutely” affected, averaging $2.5 million for data breach remediation. According to the IBM Cost of a Data Breach report (conducted by the Ponemon Institute),...
Jan 22, 2020 | Attack Surface Analysis, DevOps, Extended Capabilities, Methodology, Threat Modeling Process, ThreatModeler
Threat modeling is catching on. Increasingly, organizations are coming to the realization that securing DevOps projects as early as possible – preferably during the initial whiteboard planning and design stages – not only reduces risk, it makes good business sense....
Jan 20, 2020 | CISO, DevOps, DevSecOps, Enterprise DevSecOps, Enterprise Threat Modeling, Threat Modeling
Application Threat modeling is a structured and methodical approach that allows you to identify potential threats to applications, classify them by risk, and prioritize mitigation efforts. CISOs and other senior leaders leverage threat model ouput to drive decision...