May 13, 2024 | Cloud security, Security, Threat Modeling
By Nikunj Nagalia, VP of Solutions Architecture Amidst the tumultuous year of 2023, 23andMe found itself ensnared in a harrowing breach, compromising the sanctity of its fortified defenses and laying bare the personal data of nearly 7 million users. This cyber siege...
Sep 7, 2023 | CISO, Cloud security, Cloud Threat Modeling, Cyber Risk, DevSecOps, News, Threat Modeling
By Archie Agarwal In an era where cyber threats are constantly evolving, relying solely on reactive security measures is inadequate. The imperative for proactive risk assessment and mitigation has never been greater. Much like CAD drawings provide a blueprint for...
Jun 8, 2022 | Cloud security, Cloud Threat Modeling, Enterprise Threat Modeling, Security
Cloud cybersecurity using threat modeling is a proactive approach that identifies potential threats and suggests preventive measures before deployment in the dynamic and virtual cloud environment. This method transforms cybersecurity from being reactive to proactive,...
Apr 18, 2022 | Cloud security, Cloud Threat Modeling, Threat Modeling
The good news with deploying applications in the cloud is that you can changes things fast in response to changing demands. The bad news? The same thing: you can change things really fast. And generally speaking, fast changes and security don’t mix very well. Clouds...
Jan 24, 2022 | Cloud security, DevOps, Recent News
While there is actually a great deal of overlap between threat assessment and threat modeling in terms of their ultimate objective, they are different in terms of their scope. As NIST is quick to point out, “The assessment process is an information-gathering activity,...
Jan 17, 2022 | Cloud security, DevOps, Recent News
When it comes to a cybersecurity checklist, admittedly you could have just a single item on your list: Identify your risks and mitigate them. In some ways, it really is that simple. And it applies to processes as well as technology. As an example, take a corporate...