Jun 1, 2023 | Recent News
When it comes to protecting your attack surface, there’s hardly anything more challenging than APIs. After all, APIs are your way of granting public access to data you’re responsible for protecting. And if you’re going to have a public-facing door to your data, you’d...
May 25, 2023 | Recent News
It’s not surprising that we have to protect our critical infrastructure from cyberattacks. What might be a surprise is what all constitutes critical infrastructure. There are actually 16 sectors where the United States government has set up critical infrastructure...
May 11, 2023 | Recent News
Threat modeling in the retail industry is a proactive process of identifying, evaluating, and addressing cybersecurity threats. It involves considering potential vulnerabilities in the retail supply chain, from individual stores to associated vendors, to protect...
May 4, 2023 | Recent News
Threat modeling for healthcare organizations involves systematically identifying, assessing, and addressing potential security risks associated with the storage and transmission of sensitive patient data. This proactive approach helps to protect digital health...
Apr 27, 2023 | Recent News
Threat modeling in the financial industry is a crucial cybersecurity practice that involves identifying potential threats to assets, particularly financial data and related information. This practice is increasingly essential due to the industry’s attractiveness...