Three Pillars of a Scalable Threat Modeling Practice

Three Pillars of a Scalable Threat Modeling Practice

When threat modeling methodologies first moved from theory to application in the early 2000s, completing one model for every 40 hours of personnel resource was considered acceptable. Increasingly, internal compliance, external regulatory pressures and financial...
Most Common Troubleshoot Issues with AWS Serverless Application Repository

Most Common Troubleshoot Issues with AWS Serverless Application Repository

Serverless refers to the innate structural design of the cloud that allows users to move more of their active tasks to Amazon Web Services (AWS). The migration expands their responsiveness and allots more areas for improvement. With serverless, it is possible to run...
Differences Explained: Threat vs. Vulnerability vs. Risk

Differences Explained: Threat vs. Vulnerability vs. Risk

Threat, vulnerability and risk are terms that are inherent to cybersecurity. But oftentimes, organizations get their meanings confused. It is crucial for infosec managers to understand the relationships between threats and vulnerabilities so they can effectively...
IoT Threat Modeling: An Example Highlighting the Importance of IoT Security

IoT Threat Modeling: An Example Highlighting the Importance of IoT Security

Internet of Things (IoT) solutions are trending at an explosive rate, especially in the business world. With an exponential increase in devices that connect to the internet, businesses see huge benefits for communications and productivity. However, this can also leave...
Reduce the Cyber Risk Contribution

Reduce the Cyber Risk Contribution

Good news for companies: the Total Cost Of Risk (TCOR), a measurement used by the insurance industry and risk managers, continues to decline. Continuing a trend from the previous three years, the average TCOR decreased another 3% in 2017 vs 2016 according to the newly...