Recent Posts

Categories

See all

Archives

See all

TNP Blog

NIST Brings Threat Modeling into the Spotlight

Threat modeling hasn't always gotten the recognition that it deserves but the recent Recommended Minimum Standard for Vendor or Developer Verification of Code by the National Institute of Standards and Technology (NIST) is taking a big step in this

Read more

Why Purple Teaming?

Any modern cyber security organization, and even generally an organization that has a solid cyber security infrastructure, will be using the red team and blue team model to improve their digital security.

Read more

A Modern Approach to Protecting Against Web Threats

Just like technology, cybersecurity is growing in complexity and sophistication with every passing day. To add to this, the dynamics of the digital workspace have also completely changed in the past couple of years. People are working remotely,

Read more

What Is Ransomware as a Service and Why Is It Booming?

You’ve probably heard of SaaS businesses where SaaS stands for software-as-a-service. These businesses offer some type of software on a monthly subscription basis, thus providing value to their users while generating a steady stream of profits. RaaS

Read more

Artificial Intelligence in Cybersecurity: Pros and Cons

Due to the rapid growth of the technology industry, data exchange is happening on a bigger scale between multiple systems. The latest trend in cybersecurity is to use artificial intelligence and machine learning for better defense.

Read more

Basics of Cyber Threat Intelligence (Part 2)

In this part, we will discuss types of threat intelligence and several use cases in real-world scenarios.

Types of Threat Intelligence

There are 3 types of threat intelligence:

Read more

Basics of Cyber Threat Intelligence (Part 1)

What is Threat Intelligence?

Digital technologies facilitate automation and greater connectivity in nearly every industry today. This is a great boon, undoubtedly. However, they have also brought risks in the form of cyberattacks. Threat

Read more

Top 4 Challenges In Data Security

Data has completely changed the way businesses, individuals, and even governments operate and just like any other incredibly valuable resource, it is quite difficult to protect. Being a digital asset, there are a lot of threats that data needs to be

Read more

Best Practices for Modern SOC

No matter how large or small of a corporation a Security Operations Center (SOC) is located in the purpose remains the same. However, as things on the cybersecurity front are changing SOC's and security analysts need to modify their approach to

Read more

Phishing: Holiday Season Attacks on the Rise

Cybercrime has become a daily occurrence struggle for both businesses and individuals. Phishing, in particular, is a significant cybersecurity menace. The reason being that phishing is, according to the Digital Guardian, the most common social

Read more

Recent Posts

Categories

See all

Archives

See all