Management, compliance & auditing

Cyber threat analysis [updated 2021]

Learn about what a cyberthreat is.

Rapid threat model prototyping: Introduction and overview

Choosing a form of threat modeling can help protect your organization from security threats.

Commercial off-the-shelf IoT system solutions: A risk assessment

The rise of the Internet of Things (IoT) The Internet of Things (IoT) is growing rapidly. IoT devices provide convenience and can be a more efficient and co

A school district's guide for Education Law §2-d compliance

During the 2014-2105 fiscal year, the New York State Education Department enacted Education Law §2-d, which includes a series of provisions designed to enhan

IT auditing and controls: A look at application controls [updated 2021]

Portions of this article, including many of the definitions and terminology, have been sourced and summarized from ISACA.org and course materials published b

6 key elements of a threat model

How to identify threats and discover vulnerabilities with threat modeling Threat modeling is a process for threat discovery and risk management. Any system

Top threat modeling frameworks: STRIDE, OWASP Top 10, MITRE ATT&CK framework and more

Threat modeling is an exercise designed to identify the potential threats and attack vectors that exist for a system. Based upon this information, it is poss

Average IT manager salary in 2021

IT management is a competitive career opportunity. Some companies hire from within, but you can still find job opportunities from IT firms looking for qualif

Security vs. usability: Pros and cons of risk-based authentication

Introduction Risk-based authentication (RBA) has to become part of the enterprise lexicon for a good reason. The authentication measures used to protect acc

Threat modeling: Technical walkthrough and tutorial

Threat modeling tutorial: What to know before you begin Threat modeling is an exercise designed to help an organization identify potential threats and cyber