Blog
Literary Antidotes for Today's Security Snake Oil
Threat Modeling
A Look at RACI Models within Application Threat Modeling
In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.
Learn More
Digital Forensics & Incident Response
How to Prepare for a Security Breach Announcement
Cybersecurity breaches have become more common as ...
Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Phishing Site Uses Google Translate
An innovative campaign to spread phishing was rece...
Digital Forensics & Incident Response, Threat & Vulnerability Management
Can You Spot When You’re Being Phished?
What Does it Mean to “Send a Phish”? Phishing ...
Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Cyber Criminals Target Employees with W-2 Phishing Scam
Tax season provides an opportunity for cyber crimi...
Digital Forensics & Incident Response
Why Threat Hunting Should Be Included in Your Mergers & Acquisitions Playbook
When organizations prepare to merge or when one or...