


Threat Assessment vs Threat Modeling: What’s the Difference?
While there is actually a great deal of overlap between threat assessment and threat modeling in terms of their ultimate objective, they are different in terms of their scope. As NIST is quick to point out, “The assessment process is an information-gathering activity,...
A Cybersecurity Checklist for the New Year
When it comes to a cybersecurity checklist, admittedly you could have just a single item on your list: Identify your risks and mitigate them. In some ways, it really is that simple. And it applies to processes as well as technology. As an example, take a corporate...
Are You Ready for These 2022 Cyber Threats?
A new year, a new set of cyber threats. Are you prepared? The only thing we know for sure is that cybercriminals will never stop. In this article, we’ll briefly summarize some predictions for security threats for the coming year and one thing you can do to prepare....