Jan 22, 2020 | Security, Threat Modeling
Microsoft has released a critical patch for Windows after the US National Security Agency (NSA) detected a dangerous bug in the operating system. This hazardous vulnerability was already affecting hundreds of millions of computers running Windows 10. The main concern...
Jan 20, 2020 | CISO, DevOps, DevSecOps, Enterprise DevSecOps, Enterprise Threat Modeling, Threat Modeling
Application Threat modeling is a structured and methodical approach that allows you to identify potential threats to applications, classify them by risk, and prioritize mitigation efforts. CISOs and other senior leaders leverage threat model ouput to drive decision...
Jan 15, 2020 | Comprehensive Attack, Cyber Risk, Industrial Control System, IoT Cybersecurity, Risk Management, Threat Modeling
Industrial Control Systems (ICS) involve the devices, systems networks, controls and instrumentation that are involved in industrial process control. Entities that utilize ICS systems include power and electric utilities, telecommunications, oil and gas processing and...
Jan 14, 2020 | Cyber Risk, Threat Modeling, Threat Models
Threat modeling is vital for businesses trying to become proactive and deliberate in SDLC and CDLC with adequate application security. Security teams have started the new year planning ahead and discussing potential security risks to their organizations. To secure...
Jan 7, 2020 | Methodology, Security, Threat Modeling, Threat Modeling Process, ThreatModeler
When threat modeling methodologies first moved from theory to application in the early 2000s, completing one model for every 40 hours of personnel resource was considered acceptable. Increasingly, internal compliance, external regulatory pressures and financial...
Jan 7, 2020 | Cloud security, Cyber Risk, Recent News, Security, Threat Modeling
Data has become one of the most treasured resources in the world. Businesses that rely on cybernetic technology driven by data are perhaps the most influential companies in the world, triggering continuing discussions about anti-trust regulation, digital privacy and...