article thumbnail

Threat Modeling and Architecture

Adam Shostack

[no description provided] " Threat Modeling and Architecture " is the latest in a series at Infosec Insider. After I wrote my last article on Rolling out a Threat Modeling Program, Shawn Chowdhury asked (on Linkedin) for more informatioin on involving threat modeling in the architecture process. Have we done a good job?

article thumbnail

How Zero Trust architecture improves the organization’s network security

CyberSecurity Insiders

This blog was written by an independent guest blogger. The post How Zero Trust architecture improves the organization’s network security appeared first on Cybersecurity Insiders. In the cybersecurity field, Zero Trust is becoming a widely used model. Nobody, including clients inside the firewall, should be trusted, per Zero Trust.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Architectural Mirror (Threat Model Thursday)

Adam Shostack

I last discussed this in " Architectural Review and Threat Modeling ".) Capitol Hill Seattle blog) Now, Seattle has a very visible crisis of housing and homelessness. It's hard to face the mirror and say 'could I have done that better?' That's human nature. These 91 units will likely help 91 people or families get off the street.

article thumbnail

Monolithic vs. Microservices Architecture: Which Should I Use?

Security Boulevard

In this post we learn about monolithic vs microservices architectures and understand which to use and when. The post Monolithic vs. Microservices Architecture: Which Should I Use? The post Monolithic vs. Microservices Architecture: Which Should I Use? appeared first on Traceable App & API Security.

article thumbnail

How to evolve your organization into a data-centric security architecture

CyberSecurity Insiders

This blog was written by an independent guest blogger. The post How to evolve your organization into a data-centric security architecture appeared first on Cybersecurity Insiders. Older security models focused on network infrastructure and hardware security controls while data-centric security concentrates on the data itself.

article thumbnail

My Philosophy and Recommendations Around the LastPass Breaches

Daniel Miessler

It started back in August of 2022 as a fairly common breach notification on a blog, but it, unfortunately, turned into more of a blog series. If you follow Information Security at all you are surely aware of the LastPass breach situation. So basically: Minor incident, but no customer data or vaults were lost.

article thumbnail

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

The Last Watchdog

Splunk’s inability to migrate to a modern cloud-native architecture makes it difficult to take advantage of these cost-saving benefits or implement advanced data science use cases critical for threat detection. Influxes of data ingestion and the flat architecture of data lakes have led to difficulties in extracting value from repositories.