Jul 27, 2023 | Recent News
When doing Infrastructure as Code (IaC), threat modeling is crucial for identifying and addressing potential security risks. Here are some key steps to threat model effectively: Define Scope and Assets: Identify the assets to protect, such as data, systems, networks,...
Jul 19, 2023 | Recent News
Companies are starting to recognize the value (and requirements) of doing threat models for their applications and cloud infrastructure. And yet adoption of threat modeling as an organization-wide practice may be lower than expected. Why is that? To some extent,...
Jul 6, 2023 | Recent News
In many ways, telecom companies are no different than other companies when it comes to cybersecurity. They’re potential targets because they handle sensitive and valuable data. However, telecom companies are in a class by themselves when it comes to defending...
Jun 29, 2023 | Recent News
There seems to be a general agreement that when it comes to implementing security in the software development lifecycle (SDLC), the sooner you do it the better. After all, the speed of software releases, the use of cloud-based services, the incorporation of automation...
Jun 15, 2023 | Recent News
More and more, companies are recognizing the importance of threat modeling. With all the cyber threats, and the increase in regulatory requirements, a formal threat modeling process is a must have for many companies today. Once an organization gets onboard with threat...