Remove 2012 Remove Architecture Remove Technology
article thumbnail

Threat Model Thursday: Architectural Review and Threat Modeling

Adam Shostack

[no description provided] For Threat Model Thursday, I want to use current events here in Seattle as a prism through which we can look at technology architecture review. The cost of a house has risen nearly 25% above the 2007 market peak , and has roughly doubled in the 6 years since April 2012. artisanal micro-houses.

article thumbnail

Threat Model Thursday: Architectural Review and Threat Modeling

Adam Shostack

For Threat Model Thursday, I want to use current events here in Seattle as a prism through which we can look at technology architecture review. The cost of a house has risen nearly 25% above the 2007 market peak , and has roughly doubled in the 6 years since April 2012. Seattle has a housing and homelessness crisis.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A SOC Tried To Detect Threats in the Cloud … Your Won’t Believe What Happened Next

Anton on Security

A SOC Tried To Detect Threats in the Cloud … Your Won’t Believe What Happened Next Now, we all agree that various cloud technologies such as SaaS SIEM help your Security Operations Center (SOC). Lack of input from SOCs into cloud decisions , ranging from provider choices to IT architecture (and even security architecture).

article thumbnail

It's End of Life for ASafaWeb

Troy Hunt

A lot has changed in the Microsoft technology world in the last 7 years since I launched ASafaWeb in September 2011. Windows Server has gone from 2008 R2 to 2012 to 2012 R2 to 2016 to 2019. From development and architecture to security. The.NET framework evolved and technology moved but ASafaWeb staid frozen in time.

article thumbnail

Hyperautomation and the Future of Cybersecurity

eSecurity Planet

A blend of robotic process automation, machine learning technology, and artificial intelligence, hyperautomation seeks to refine and improve business and technology processes that previously required a human decision-maker. The major disadvantages of hyperautomation: Requires a next-gen technology infrastructure.

article thumbnail

Beyond the Surface: the evolution and expansion of the SideWinder APT group

SecureList

SideWinder, aka T-APT-04 or RattleSnake, is one of the most prolific APT groups that began its activities in 2012 and was first publicly mentioned by us in 2018. Some infection routines do not check the architecture. The payloads are selected at runtime according to the system architecture, and merged before injection.

Malware 143
article thumbnail

A SOC Tried To Detect Threats in the Cloud … Your Won’t Believe What Happened Next

Security Boulevard

Now, we all agree that various cloud technologies such as SaaS SIEM help your Security Operations Center (SOC). In this post, I wanted to quickly touch on this very topic and refresh some past analysis of this (and perhaps reminisce on how sad things were in 2012 ). Also, log support is often not done at “cloud speed.”.