Threat Modeling VS Penetration Testing

Threat Modeling VS Penetration Testing

The field of Information Security always brings up images of hackers and crackers hacking and exposing systems. While it is entirely not false, there are plenty of ways and procedures to prevent these types of attacks or keep these attacks to a minimal level and...
Threat Modeling In Practice

Threat Modeling In Practice

Threat Modeling, as we are all aware, is identifying the threats in an organization and applying measures to mitigate them. This greatly reduces breaches within an organization. From the OWASP foundation, “Threat modeling works to identify, communicate, and understand...
Balancing Speed vs Security in DevSecOps

Balancing Speed vs Security in DevSecOps

The technology world is highly competitive and constantly evolving. In this context, the speed of product releases is critical for organizations to measure success.  There is always an urgent need for organizations to push products into production faster. Let us take...
Prioritizing Product Security with DevSecOps

Prioritizing Product Security with DevSecOps

In 2020’s  “security” can no longer be an afterthought. It has to be an encompassing fact of all organizations and all employees have to be a part of it.  “Security” earlier only meant physical security, secure coding, hardware security, anti-virus definitions, and...
DREAD Threat Modeling Methodology

DREAD Threat Modeling Methodology

In our hyper-connected world, security breaches, and incidents are a certainty. According to a report from Statista, the cost of cybercrime committed globally is expected to rise from $8.44 trillion in 2022 to $23.84 trillion by 2027.  Statista’s report expects...
Index