Blog

Literary Antidotes for Today’s Security Snake Oil

A Look at RACI Models within Application Threat Modeling

Threat Modeling

A Look at RACI Models within Application Threat Modeling

In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.

Learn More

Category

View All
Cyberattack Readiness Checklist
Threat & Vulnerability Management

Cyberattack Readiness Checklist

=[-09

DevSecOps: Your Secret Weapon Against Supply Chain Attacks
DevSecOps, In The News, Supply Chains, Threat & Vulnerability Management

DevSecOps: Your Secret Weapon Against Supply Chain Attacks

How adding security throughout the SDLC using DevS…

Translating Preventative Risk Mitigation to ROI 
Governance Risk & Compliance

Translating Preventative Risk Mitigation to ROI 

Guide to understanding the investment value of pre…

The Rise of AI in Cybersecurity: Expert Insights on the Benefits and Challenges of ChatGPT
News

The Rise of AI in Cybersecurity: Expert Insights on the Benefits and Challenges of ChatGPT

Interview with Tony UV

Grey Box Application Testing: What It Is and Why You Need It
News

Grey Box Application Testing: What It Is and Why You Need It

Grey box pen testing is the best approach to ensur…

VerSprite and AppSecEngineer Partner to Operationalize Security Training
News

VerSprite and AppSecEngineer Partner to Operationalize Security Training

Full-stack, comprehensive, and affordable security…

Nordstream Pipelines Attacks
News

Nordstream Pipelines Attacks

Geopolitical Risk Assessment Russia – Ukraine Co…

Envisions Geopolitical Threat Report:
News

Envisions Geopolitical Threat Report:

Geopolitical Trends Influencing Cybercrime In VerS…

DATA *MIS*MANAGEMENT: ONE OF THE LEADING CAUSES OF SECURITY BREACHES
News

DATA *MIS*MANAGEMENT: ONE OF THE LEADING CAUSES OF SECURITY BREACHES

Steps to take now to ensure data management oversi…

Domain Spoofing and Phishing Attacks
News

Domain Spoofing and Phishing Attacks

Minimize phishing cyberattacks and prevent domain …

PCI DSS 4.0: What You Need to Know and What You Need to Do
News

PCI DSS 4.0: What You Need to Know and What You Need to Do

Is Your Company Ready to Make the Transition to PC…

AI and Cybersecurity: Threats and Opportunities
News

AI and Cybersecurity: Threats and Opportunities

AI and Machine Learning Tools Are Changing Cyberse…

Welcome to The World of Geopolitics and Cybersecurity!
News

Welcome to The World of Geopolitics and Cybersecurity!

In today’s interconnected global landscape,&nbsp…

Why Bad Guys do Bad Things: How Maslow’s Hierarchy of Needs can help identify cyber threats.
News

Why Bad Guys do Bad Things: How Maslow’s Hierarchy of Needs can help identify cyber threats.

Daniel Stiegman Principal Intelligence Analyst –…

Why Bad Guys do Bad Things:
News

Why Bad Guys do Bad Things:

How Maslow’s Hierarchy of Needs can help identif…