Another Year—Another Reason to do Threat Modeling

Another Year—Another Reason to do Threat Modeling

It’s 2023 and the world of application development is slowly but surely migrating from DevOps to DevSecOps. As you probably know, DevSecOps “automates the integration of security at every phase of the software development lifecycle, from initial design through...
New cybersecurity technology 2022

New cybersecurity technology 2022

As the year ends, Security magazine spotlights cybersecurity solutions released in 2022. Covering everything from insider risk mitigation to improved threat monitoring, we spotlight innovative cybersecurity products and technology that can help enterprise security...
Cybersecurity Threats in the Hotel and Hospitality Industry

Cybersecurity Threats in the Hotel and Hospitality Industry

Making the decision to stay at a hotel involves a high level of trust. With the advent of Wi-Fi and IoT-embedded devices, e.g. televisions and refrigerators, today’s hotels need to protect their guest’s data security just as they do their physical belongings. It is no...
Modernize Your SQL Server Environment with VMware Cloud on AWS

Modernize Your SQL Server Environment with VMware Cloud on AWS

Organizations migrating to a public cloud often face the same challenge: a major architectural variation between various base components such as monitoring and storage. VMware Cloud on AWS (Amazon Web Services) is committed to delivering steady software defined data...
Threat Modeling for 5G Cybersecurity

Threat Modeling for 5G Cybersecurity

5G structures are the next step in the development of mobile networking. We are about to embark on a next generation system level that emboldens mobile communications with trials and ongoing scale sales. The fifth generation wireless system (5G) seeks to give...