A Guide to Embedding Threat Modeling into Risk Management (Part 1)
Overview Showing the benefits of threat modeling to management less invested in cyber security topics is notoriously hard as the added value of security, in ...
Read MoreOverview Showing the benefits of threat modeling to management less invested in cyber security topics is notoriously hard as the added value of security, in ...
Read MoreWeb Application Firewalls (WAFs) are the go-to infrastructure components used to hinder attacks against web applications. What is it that WAFs really offer – can they ...
Read MoreLast week, November 17th and 18th, the DeepSec security conference took place in the Renaissance hotel in Vienna. With more than 50 talks and workshops content was ...
Read MoreIn constant fire. Ransom? Data? Preferably both! Extortion gangs and hackers on behalf of states are becoming the greatest threat to the economy. Experts advise ...
Read More