7 Cybersecurity Podcasts You Should Listen to Now

7 Cybersecurity Podcasts You Should Listen to Now

Technology continues to evolve at lightning speed, and hackers are working as fast as they can to manifest the latest cybersecurity threat. In this era of cyber disruption, keeping up with cybersecurity news is a must these days – for organizations and consumers...
Importance of Cybersecurity Reporting for CISOs

Importance of Cybersecurity Reporting for CISOs

With cybersecurity becoming a crucial part of a successful technology development life cycle, it cannot be stressed enough the significance of reporting. For CISOs, reporting is a crucial part of the puzzle, and provides a tangible way for development, security and...
Threat Modeling Important for Small-and-Midsize Business

Threat Modeling Important for Small-and-Midsize Business

According to a 2019 study on the financial impacts of data breaches, small-to-midsize businesses (SMBs) are “acutely” affected, averaging $2.5 million for data breach remediation. According to the IBM Cost of a Data Breach report (conducted by the Ponemon Institute),...
Architecturally-Based Process Flow Diagrams: Examples and Tips to Follow

Architecturally-Based Process Flow Diagrams: Examples and Tips to Follow

Threat modeling is catching on. Increasingly, organizations are coming to the realization that securing DevOps projects as early as possible – preferably during the initial whiteboard planning and design stages – not only reduces risk, it makes good business sense....
Application Threat Modeling: Guide for CISOs

Application Threat Modeling: Guide for CISOs

Application Threat modeling is a structured and methodical approach that allows you to identify potential threats to applications, classify them by risk, and prioritize mitigation efforts. CISOs and other senior leaders leverage threat model ouput to drive decision...