Jan 9, 2020 | Attack Surface Analysis, AWS, DevSecOps, ThreatModeler
As technology advances, so does cybercrime. Hackers find increasingly sophisticated ways to compromise IT systems and applications. Organizations are in a position to take more proactive approaches to cybersecurity. Chief Information Security Officer (CISOs) and...
Jan 7, 2020 | Methodology, Security, Threat Modeling, Threat Modeling Process, ThreatModeler
When threat modeling methodologies first moved from theory to application in the early 2000s, completing one model for every 40 hours of personnel resource was considered acceptable. Increasingly, internal compliance, external regulatory pressures and financial...
Dec 4, 2019 | AWS, Cloud security, DevSecOps, ThreatModeler
Serverless refers to the innate structural design of the cloud that allows users to move more of their active tasks to Amazon Web Services (AWS). The migration expands their responsiveness and allots more areas for improvement. With serverless, it is possible to run...
Sep 17, 2019 | Attack Surface Analysis, Risk Management, ThreatModeler
Threat, vulnerability and risk are terms that are inherent to cybersecurity. But oftentimes, organizations get their meanings confused. It is crucial for infosec managers to understand the relationships between threats and vulnerabilities so they can effectively...
Aug 12, 2019 | Threat Models, ThreatModeler
Threat modeling for IT system and application security entered the cybersecurity mainstream in the early 2000s. Initially, the discipline borrowed its analytic concepts from other, more mature fields. Threat trees, attacker profiles, and risk-analysis – foundational...
Aug 7, 2019 | IoT Cybersecurity, Methodology, Security, Threat Modeling, Threat Modeling Process, Threat Models, ThreatModeler
Internet of Things (IoT) solutions are trending at an explosive rate, especially in the business world. With an exponential increase in devices that connect to the internet, businesses see huge benefits for communications and productivity. However, this can also leave...