Oct 23, 2024 | Cloud Threat Modeling, Threat Modeling, Threat Modeling Tools
During the rapid adoption of cloud technology during the COVID-19 pandemic, answers came quicker than questions. But as rising cloud costs and inherent complexity due to hybrid and multi-cloud architectures become clearer, the questions are mounting. While rising...
Sep 14, 2023 | Cyber Risk
Cyber insurance is now a big business (and growing more over time). Cyber insurance statistics show that claims grew by 100% in the past three years while claims closed with payments grew by 200% with around 8100 claims paid in 2021. Of course, certain industries are...
Sep 7, 2023 | Threat Modeling
Everyone involved in application development would rather prevent an incident than have to respond to one. The adage, an ounce of prevention…does apply. That’s where threat modeling comes in, and why threat modeling is essential for your security operations. It’s one...
Aug 24, 2023 | API Security, DevSecOps, Threat Modeling
There was a time when developing secure code was just a good idea. Now, in many instances, it’s a requirement. But how do you know if a developer is developing secure code? The key here is knowing it’s secure.There are actually two aspects to developing secure code....
Aug 17, 2023 | Recent News
Everyone is a fan of agile development. And while there are many benefits to adopting an agile methodology, one of the most important is that it speeds up software development. “Oftentimes products developed according to agile methodologies do end up getting shipped...