Jun 8, 2020 | AWS Security Epics Automated, Cyber Risk, Threat Modeling, Threat Modeling Process
As part of the 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), a paper was reviewed and accepted entitled: “Security Threat Modeling: Are Data Flow Diagrams Enough?” Anybody interested in the field of threat modeling would...
Apr 28, 2020 | Attack Surface Analysis, CISO, DevSecOps, Enterprise DevSecOps, Enterprise Threat Modeling, Security, Threat Modeling, ThreatModeler News
As organizations struggle to maintain support of security initiatives during uncertain times, ThreatModeler is contributing its industry leading technology to embolden the DevSecOps community to continuously prioritize the protection of their applications – in minutes...
Apr 2, 2020 | Attack Surface Analysis, Cyber Risk, Recent News, Security, Threat Modeling
On Tuesday, March 31, hospitality company Marriott International disclosed information that it suffered a massive data breach. The number of consumers affected is currently tallied at 5.2 million. Marriott revealed that someone used the log-in credentials of two...
Feb 10, 2020 | Recent News, Security, Threat Modeling
Improving election cybersecurity is becoming increasingly important as recent voter fraud and election hackings continue to shake the nation. Innovators and security organizations are looking into the endless possibilities of applying blockchains to enhance election...
Jan 30, 2020 | CISO, Cloud security, DevOps, DevOps Implementation, Threat Modeling
According to a 2019 study on the financial impacts of data breaches, small-to-midsize businesses (SMBs) are “acutely” affected, averaging $2.5 million for data breach remediation. According to the IBM Cost of a Data Breach report (conducted by the Ponemon Institute),...
Jan 28, 2020 | Comprehensive Attack, Security, Threat Modeling
It’s just the beginning of 2020 and there have been a number of data breaches to raise browse and concern over the state of cybersecurity for the New Year.. The following is a brief summary of some of the most relevant cybersecurity breaches uncovered. From...