Dec 15, 2022 | Recent News
We’ve reached the point where security decision makers have come to embrace the idea of threat modeling. The notion of finding and eliminating cyber vulnerabilities before they become cyber incidents is a pretty easy idea to get behind. But just because decision...
Feb 27, 2020 | EU GDPR, Risk Management, ThreatModeler
The EU General Data Protection Regulation (GDPR) is the European Union’s upgrade of the current Data Protection Direction. The GDPR is one of the most sweeping overhauls of data protection the world has ever seen. Not only does GDPR come with real teeth – including...
Feb 13, 2020 | Attack Surface Analysis, Cloud security, DevOps, Risk Management, Security
Password security is no joke. It’s a security measure for the point of entry to personally identifiable information (PII), and confidential, sensitive information. The first thing anyone should know when creating an account is to never share their password....
Feb 4, 2020 | CISO, Cloud security, DevOps, IoT Cybersecurity, Security
Thanks to the Internet of Things (IoT) tech, medical devices are increasingly capable of delivering innovative patient care, with monitoring and support around the clock. However, internet-enabled medical devices are also a prime target for hackers who use malware...
Jan 15, 2020 | Comprehensive Attack, Cyber Risk, Industrial Control System, IoT Cybersecurity, Risk Management, Threat Modeling
Industrial Control Systems (ICS) involve the devices, systems networks, controls and instrumentation that are involved in industrial process control. Entities that utilize ICS systems include power and electric utilities, telecommunications, oil and gas processing and...