Where to do Threat Modeling in a CI/CD Pipeline?

Where to do Threat Modeling in a CI/CD Pipeline?

When it comes to developing software, everyone pretty much agrees it’s a good idea to know where the vulnerabilities are in the software BEFORE you deploy it. And using threat modeling is certainly a good option for identifying those vulnerabilities. In the years...
AWS: reInvent 2021 – Highlights and Some Help

AWS: reInvent 2021 – Highlights and Some Help

Now that AWS: reInvent 2021 in Las Vegas has wrapped up, it’s time to look back and see what the highlights were. What were the top stories? The #1 Story at AWS:reInvent There were plenty of stories at the show. From improved processors (i.e., Graviton 3), to IoT...
AWS re:Invent: It’s Not Too Late to Attend

AWS re:Invent: It’s Not Too Late to Attend

People and organizations generally want to begin the new year with a clean house. That includes organizations seeking enterprise transformation involving cloud migration. The end of the year is as good a time as any to flip the switch. With a little research, you can...
Don’t Overlook This Booth #1626 at AWS Reinvent

Don’t Overlook This Booth #1626 at AWS Reinvent

Are you heading over to AWS Reinvent in Las Vegas, November 29 – December 3, 2021? If so, then there’s a booth you’re going to want to visit, especially if migrating to the cloud is in your future. But first, you have to understand why. The Curious Case of Cloud...
Does Your Threat Modeling Tool Have This Essential Capability

Does Your Threat Modeling Tool Have This Essential Capability

Until very recently, threat modeling was strictly a proactive technique to identify and mitigate potential threats in an application. Creating the threat model was something you did during development and before you launched the application. It had a very “fire and...