Threatmodelingattackingblog Header Graphic

Threat Modeling: ATT&CK-ing Risk Management

In May, LookingGlass wrote about the benefits of threat modeling – specifically emphasizing its ...
Fabricblog Header Graphic

Solving Today’s Cybersecurity Challenges with a Cybersecurity Fabric

The introduction of the cloud, mobility, and Internet of Things (IoT) means organizations are ...
Energysectorblog Header Graphic

Afraid of the Dark: Cyber Threats to the Energy Sector (Part Two)

In the second installment of this series, we explore the different attack vectors used against the ...
Energysectorblog Header Graphic

Afraid of the Dark: Cyber Threats to the Energy Sector (Part One)

In the first installment of this series, we will explore the different threat actor groups that ...
Blog Healthcare Stop Data Breaches Header Compressor

It’s a Beautiful Day to Stop Breaches

The Healthcare industry is in a cyber crisis; health organizations are aware of the issues, but are ...
Blog Threatmodeling2 Header Compressor

Modeling Business Risk to Advanced Persistent Threats

Advanced persistent threats (APT) are known as one of the most stealthy and sophisticated ...
Blog Islandhopping Header Compressor

Island Hopping: Modern-Day Cyber Warfare

During WWII on the Pacific Front, the Allied strategy was to slowly conquer small islands off the ...
Blog Holding your data hostage Header Compressor

Holding Your Data Hostage: Ransomware in 2019

You might have had this nightmare or heard about this horror story on the news: Your loved one is ...
Blog Threatmodeling Header Compressor 2

Threat Modeling: Is it worth the hype? Only if you want to be proactive.

In security, our biggest battle is getting ahead of the next security incident. Each incident ...
Blog Sports Industry Header Compressor

Protect This House: Cyber Threats to Sports Organizations in 2019

Sports organizations and franchises have security measures in place to protect their athletes on ...