Threat Modeling: Protecting Security Infrastructures in 2019

A pressing challenge throughout 2019 is cybersecurity professionals must manage industry shifts as they protect security infrastructures. These industry trends and issues are compounded by a lack of visibility into the location and security of data inv… Continue reading Threat Modeling: Protecting Security Infrastructures in 2019

Insider Threat Management – Detect and Respond to Data Exfiltration

As the perimeter shifts to the user and application, traditional network-based data loss prevention solutions are no longer effective. There is no longer a central network egress point to control the flow of data, as users, and the applications they ac… Continue reading Insider Threat Management – Detect and Respond to Data Exfiltration

Insider Threat Management – Detect and Respond to Data Exfiltration

As the perimeter shifts to the user and application, traditional network-based data loss prevention solutions are no longer effective. There is no longer a central network egress point to control the flow of data, as users, and the applications they ac… Continue reading Insider Threat Management – Detect and Respond to Data Exfiltration

BSides Columbus 2019, Isaiah Sarju’s ‘How Online Dating Made Me Better At Threat Modeling’

Videography Credit: Irongeek (Adrian Crenshaw, et. al). Please visit Irongeek for additional videographer credits and important information. Enjoy!
Permalink
The post BSides Columbus 2019, Isaiah Sarju’s ‘How Online Dating Made Me Better At… Continue reading BSides Columbus 2019, Isaiah Sarju’s ‘How Online Dating Made Me Better At Threat Modeling’