Jul 6, 2023 | Recent News
In many ways, telecom companies are no different than other companies when it comes to cybersecurity. They’re potential targets because they handle sensitive and valuable data. However, telecom companies are in a class by themselves when it comes to defending...
Jun 22, 2023 | Recent News
The US Government has wanted to purchase secure software for years, but recently something changed. Now they want proof that the software is secure. Building off the May 12, 2021 executive order from President Joe Biden, the Office of Management and Budget (OMB)...
Jun 15, 2023 | Recent News
More and more, companies are recognizing the importance of threat modeling. With all the cyber threats, and the increase in regulatory requirements, a formal threat modeling process is a must have for many companies today. Once an organization gets onboard with threat...
Jun 8, 2023 | Recent News
Imagine you’re a developer in the middle of your current two-week sprint. You’re under a lot of pressure and working long days when the application architect tells you that you need to threat model your design. You may not have a lot of threat modeling experience. At...
Jun 1, 2023 | Recent News
When it comes to protecting your attack surface, there’s hardly anything more challenging than APIs. After all, APIs are your way of granting public access to data you’re responsible for protecting. And if you’re going to have a public-facing door to your data, you’d...