The US Government has wanted to purchase secure software for years, but recently something changed. Now they want proof that the software is secure. Building off the May 12, 2021 executive order from President Joe Biden, the Office of Management and Budget (OMB)...
More and more, companies are recognizing the importance of threat modeling. With all the cyber threats, and the increase in regulatory requirements, a formal threat modeling process is a must have for many companies today. Once an organization gets onboard with threat...
Imagine you’re a developer in the middle of your current two-week sprint. You’re under a lot of pressure and working long days when the application architect tells you that you need to threat model your design. You may not have a lot of threat modeling experience. At...
When it comes to protecting your attack surface, there’s hardly anything more challenging than APIs. After all, APIs are your way of granting public access to data you’re responsible for protecting. And if you’re going to have a public-facing door to your data, you’d...
It’s not surprising that we have to protect our critical infrastructure from cyberattacks. What might be a surprise is what all constitutes critical infrastructure. There are actually 16 sectors where the United States government has set up critical infrastructure...