The Best Cyber Insurance is Not What You Think

The Best Cyber Insurance is Not What You Think

Cyber insurance is now a big business (and growing more over time). Cyber insurance statistics show that claims grew by 100% in the past three years while claims closed with payments grew by 200% with around 8100 claims paid in 2021. Of course, certain industries are...
One Good Way to Know if Developers are Developing Secure Code

One Good Way to Know if Developers are Developing Secure Code

There was a time when developing secure code was just a good idea. Now, in many instances, it’s a requirement. But how do you know if a developer is developing secure code? The key here is knowing it’s secure.There are actually two aspects to developing secure code....
Five Things to Look for in a Threat Modeling Tool

Five Things to Look for in a Threat Modeling Tool

Organizations are starting to warm up to the idea that they need to implement threat modeling. After all, it’s not just good business, but in many cases, it’s mandatory. For example, there are now many regulatory bodies that mandate threat modeling. These include in...
Threat Modeling for Critical Infrastructure

Threat Modeling for Critical Infrastructure

It’s not surprising that we have to protect our critical infrastructure from cyberattacks. What might be a surprise is what all constitutes critical infrastructure. There are actually 16 sectors where the United States government has set up critical infrastructure...
Cybersecurity Tool Bloat—Yeah it’s a Thing

Cybersecurity Tool Bloat—Yeah it’s a Thing

Listen to any cybersecurity tool vendor and they’ll try to convince you of two things. You need their type of product for protection and theirs is the best of breed. And most of them can be very persuasive. The result? Lots of unused (and often unneeded) security...