Oct 15, 2019 | AWS, Cloud security, Threat Modeling
Developer toolboxes are the lifeline for architects to thrive within the software development life cycle (SDLC). A toolbox can comprise a number of solutions, including programming languages, and HTTP servers, load balancers, and databases (both relational and NoSQL)....
Sep 25, 2019 | Cloud security, Threat Modeling
The 21st century has seen many significant technological advancements in the cross-section of digitalization, cybersecurity, and cloud security. As more valuable data is being stored and used to make data-driven decisions, its protection against internal...
Sep 20, 2019 | Threat Modeling
The recent ransomware attacks on Texas and Louisiana schools shed some light on how vulnerable government is to cyber threats. At the 2nd Annual Cybersecurity Summit on September 18, Christopher Krebs – Director of the Cybersecurity and Infrastructure Security Agency,...
Sep 5, 2019 | Attack Surface Analysis, Recent News, Threat Modeling
Securing the 2020 US state, federal and presidential elections against cyberattacks became the topic of serious discussion for both the private and public sector this week. Within the context of elections cybersecurity, threat modeling is a top priority for technology...
Sep 3, 2019 | Attack Surface Analysis, Cloud security, Cyber Risk, Threat Modeling
SQL injections are a malicious form of cyberattack in which hackers insert malicious code into database servers. SQL injections can take control of applications and compromise security measures. SQL injections are among the oldest, most common forms of web application...
Aug 29, 2019 | API Security, Security, Threat Modeling
Cyberattackers that target passwords, also known as password cracking, is one of the most common techniques used in compromising secured data. Password attacks have left even the biggest companies vulnerable, including Yahoo and Adobe. Taking proper precautions to...