A Cybersecurity Checklist for the New Year

A Cybersecurity Checklist for the New Year

When it comes to a cybersecurity checklist, admittedly you could have just a single item on your list: Identify your risks and mitigate them. In some ways, it really is that simple. And it applies to processes as well as technology. As an example, take a corporate...
Are You Ready for These 2022 Cyber Threats?

Are You Ready for These 2022 Cyber Threats?

A new year, a new set of cyber threats. Are you prepared? The only thing we know for sure is that cybercriminals will never stop. In this article, we’ll briefly summarize some predictions for security threats for the coming year and one thing you can do to prepare....
Where to do Threat Modeling in a CI/CD Pipeline?

Where to do Threat Modeling in a CI/CD Pipeline?

When it comes to developing software, everyone pretty much agrees it’s a good idea to know where the vulnerabilities are in the software BEFORE you deploy it. And using threat modeling is certainly a good option for identifying those vulnerabilities. In the years...
AWS: reInvent 2021 – Highlights and Some Help

AWS: reInvent 2021 – Highlights and Some Help

Now that AWS: reInvent 2021 in Las Vegas has wrapped up, it’s time to look back and see what the highlights were. What were the top stories? The #1 Story at AWS:reInvent There were plenty of stories at the show. From improved processors (i.e., Graviton 3), to IoT...