Georgia Tech Data Breach: VerSprite Interviewed on Threat Motives
VerSprite Responds to Massive Data BreachThe recent Georgia Institute of Technology data breach exposed 1.3 million personal records. Tony UcedaVélez, VerSprite CEO, was interviewed by WSBTV about why such an elite university makes such an attractive target for hackers: "Their relationships with different technology companies worldwide, as well as with the federal government makes them much more unique. The cyber attacker's main goal is getting as much data as possible and conducting their own data analytics to see where they want to focus in on targeted attacks." - Tony UcedaVélez Learn more about cyber threat motives and threat modeling in our guide, Threat Modeling: Process for Attack Simulation and Threat Analysis.
Risk Centric Threat Modeling: Process for Attack Simulation & Threat Analysis
VerSprite leverages our PASTA (Process for Attack Simulation & Threat Analysis) methodology to apply a risk-based approach to threat modeling. This methodology integrates business impact, inherent application risk, trust boundaries amongst application components, correlated threats, and attack patterns that exploit identified weaknesses from the threat modeling exercises.
Subscribe for Our Updates
Please enter your email address and receive the latest updates.