May 17, 2023 | Recent News
Even with software supposedly eating the world, there are still plenty of companies that make physical things. These products may not be as sexy or profitable as software, but they are every bit as essential. From a cybersecurity standpoint, not much has changed in...
May 4, 2023 | Recent News
Threat modeling for healthcare organizations involves systematically identifying, assessing, and addressing potential security risks associated with the storage and transmission of sensitive patient data. This proactive approach helps to protect digital health...
Mar 12, 2020 | 5G Security, Attack Surface Analysis, Cloud security, IoT Cybersecurity
With the pending dominance Internet of Things (IoT) adoption in business applications, combined with a growing necessity for mobile devices and laptops, the limitations of 4G LTE technology serves as a motivation for mobile network operators to launch enhanced 5G...
Feb 6, 2020 | Attack Surface Analysis, IoT Cybersecurity, Risk Management, Security
Making the decision to stay at a hotel involves a high level of trust. With the advent of Wi-Fi and IoT-embedded devices, e.g. televisions and refrigerators, today’s hotels need to protect their guest’s data security just as they do their physical belongings. It is no...
Aug 7, 2019 | IoT Cybersecurity, Methodology, Security, Threat Modeling, Threat Modeling Process, Threat Models, ThreatModeler
Internet of Things (IoT) solutions are trending at an explosive rate, especially in the business world. With an exponential increase in devices that connect to the internet, businesses see huge benefits for communications and productivity. However, this can also leave...