The Collateral Damage of a Social Profile Data Breach

The Collateral Damage of a Social Profile Data Breach

The previous installment in our series on the collateral damage, which a data breach can wreak upon individuals, we considered the profound possibilities of a credit card data breach.  This article reviews the potential damages that can occur with a social profile...
Create a Drone Threat Model to Understand the Impact of a Data Breach

Create a Drone Threat Model to Understand the Impact of a Data Breach

From the hobbyist looking for exciting recreation, to air force commanders coordinating military campaigns, Unmanned Arial Vehicles (UAV) – otherwise known as drones – have permeated our everyday lives. As one might expect, where there’s emerging technology based on...
Securing IoT Requires a Big-Picture View With Threat Modeling

Securing IoT Requires a Big-Picture View With Threat Modeling

Over the course of recent years, Internet of Things (IoT)-embedded technology has become more pervasive. IoT is finding its way into all of the major industries. From retail, to to critical infrastructure and everything in between, IoT devices are everywhere. They are...
Telecom Security: Using Network Security Models to Mitigate Threats

Telecom Security: Using Network Security Models to Mitigate Threats

Telecom networks tie together and coordinate activity between other critical infrastructures, businesses, government agencies, and individuals. In our highly interconnected cyber ecosystem, virtually everyone relies on telecom networks for “always on” services.[1]...
IoT Threat Modeling: An Example Highlighting the Importance of IoT Security

IoT Threat Modeling: An Example Highlighting the Importance of IoT Security

Internet of Things (IoT) solutions are trending at an explosive rate, especially in the business world. With an exponential increase in devices that connect to the internet, businesses see huge benefits for communications and productivity. However, this can also leave...