Jun 28, 2022 | DevOps, Risk Management, Threat Modeling, Threat Models, ThreatModeler
Early in a technology’s evolution, the adoption can be rapid—maybe even exponential—and yet sill fly under the radar because the market is so small. And that’s where threat modeling is today. Threat modeling is not yet a category with a sizeable TAM (total addressable...
Jun 1, 2022 | Threat Models
Banks are the original threat modelers. Going back to the days when they hired the Pinkerton Agency to protect their valuables being transported by stagecoach, banks have always tried to stay one step ahead of their adversaries. Of course, when it comes to protecting...
May 8, 2022 | Enterprise Threat Modeling, Security, Threat Models
Financial institutions are consistently in the top-five list of cyber attack targets, with the greatest increase in data breach risk coming from outside hackers.[1] Customer financial records and associated personally identifying information are high-value commodities...
May 28, 2020 | AWS, Threat Models
The premise behind least privilege is simple: if you want to protect your bank vault, start by being very careful about who gets a key. In the cybersecurity world, least privilege works very much the same, but instead of keys and bank vaults, its access to sensitive...
Jan 29, 2020 | Recent News, Regulatory Compliance, Risk Management, Security, Threat Models
As we approach the 2020 elections, the U.S. becomes a huge target for digital threats. From election interference to fraud, the need for adequate cybersecurity measures becomes more prevalent than ever. Challenges facing the upcoming elections seem to put the...
Jan 14, 2020 | Cyber Risk, Threat Modeling, Threat Models
Threat modeling is vital for businesses trying to become proactive and deliberate in SDLC and CDLC with adequate application security. Security teams have started the new year planning ahead and discussing potential security risks to their organizations. To secure...