Threat Modeling for Retail Organizations

Threat Modeling for Retail Organizations

Threat modeling in the retail industry is a proactive process of identifying, evaluating, and addressing cybersecurity threats. It involves considering potential vulnerabilities in the retail supply chain, from individual stores to associated vendors, to protect...
Threat Modeling for Healthcare Organizations

Threat Modeling for Healthcare Organizations

Threat modeling for healthcare organizations involves systematically identifying, assessing, and addressing potential security risks associated with the storage and transmission of sensitive patient data. This proactive approach helps to protect digital health...
An Overlooked Reason Why There are so Many Data Breaches

An Overlooked Reason Why There are so Many Data Breaches

Take a look at the headlines in any security news outlet and one thing really stands out. There are data breaches everywhere. That happen all the time, to organizations that know better. And it’s not like anyone wants a data breach. In fact, just the opposite is true....
The Collateral Damage of a Social Profile Data Breach

The Collateral Damage of a Social Profile Data Breach

The previous installment in our series on the collateral damage, which a data breach can wreak upon individuals, we considered the profound possibilities of a credit card data breach.  This article reviews the potential damages that can occur with a social profile...
Server on GCS Left Unsecured on the Web, Macy’s and T-Mobile Hacked

Server on GCS Left Unsecured on the Web, Macy’s and T-Mobile Hacked

Approximately 1.2 billion records on an unsecured Google Cloud Services database were found on the web. Vinny Troia, a cybersecurity researcher with a focus on the Dark Web, found 1.2 billion records on an unsecured server. A total of 4 terabytes of personal...

ThreatModeler

ThreatModeler revolutionizes threat modeling during the design phase by automatically analyzing potential attack surfaces. Harness our patented functionalities to make critical architectural decisions and fortify your security posture.

Learn more >

CloudModeler

Threat modeling remains essential even after deploying workloads, given the constantly evolving landscape of cloud development and digital transformation. CloudModeler not only connects to your live cloud environment but also accurately represents the current state, enabling precise modeling of your future state

Learn more >

IaC-Assist

DevOps Engineers can reclaim a full (security-driven) sprint with IAC-Assist, which streamlines the implementation of vital security policies by automatically generating threat models through its intuitive designer.

Learn more >