by threatmodeler | Feb 27, 2020 | EU GDPR, Risk Management, ThreatModeler
The EU General Data Protection Regulation (GDPR) is the European Union’s upgrade of the current Data Protection Direction. The GDPR is one of the most sweeping overhauls of data protection the world has ever seen. Not only does GDPR come with real teeth – including...
by threatmodeler | Feb 13, 2020 | Attack Surface Analysis, Cloud security, DevOps, Risk Management, Security
Password security is no joke. It’s a security measure for the point of entry to personally identifiable information (PII), and confidential, sensitive information. The first thing anyone should know when creating an account is to never share their password....
by threatmodeler | Feb 4, 2020 | CISO, Cloud security, DevOps, IoT Cybersecurity, Security, Uncategorized
Thanks to the Internet of Things (IoT) tech, medical devices are increasingly capable of delivering innovative patient care, with monitoring and support around the clock. However, internet-enabled medical devices are also a prime target for hackers who use malware...
by threatmodeler | Jan 15, 2020 | Comprehensive Attack, Cyber Risk, Industrial Control System, IoT Cybersecurity, Risk Management, Threat Modeling
Industrial Control Systems (ICS) involve the devices, systems networks, controls and instrumentation that are involved in industrial process control. Entities that utilize ICS systems include power and electric utilities, telecommunications, oil and gas processing and...
by threatmodeler | Dec 18, 2019 | AWS, Cloud security, Events, Uncategorized
It’s been two weeks since AWS re: invent 2019 took place in Las Vegas, Nevada. As the biggest cloud computing conference in the country, Amazon Web Services didn’t disappoint with a turnout of more than 65,000 attendees. AWS re:Invent revealed details about a heap of...