Threat modeling hasn't always gotten the recognition that it deserves but the recent Recommended Minimum Standard for Vendor or Developer Verification of Code by the National Institute of Standards and Technology (NIST) is taking a big step in this
Read moreTNP Blog
NIST Brings Threat Modeling into the Spotlight
Why Purple Teaming?
Any modern cyber security organization, and even generally an organization that has a solid cyber security infrastructure, will be using the red team and blue team model to improve their digital security.
Read moreA Modern Approach to Protecting Against Web Threats
Just like technology, cybersecurity is growing in complexity and sophistication with every passing day. To add to this, the dynamics of the digital workspace have also completely changed in the past couple of years. People are working remotely,
Read moreWhat Is Ransomware as a Service and Why Is It Booming?
You’ve probably heard of SaaS businesses where SaaS stands for software-as-a-service. These businesses offer some type of software on a monthly subscription basis, thus providing value to their users while generating a steady stream of profits. RaaS
Read moreArtificial Intelligence in Cybersecurity: Pros and Cons
Due to the rapid growth of the technology industry, data exchange is happening on a bigger scale between multiple systems. The latest trend in cybersecurity is to use artificial intelligence and machine learning for better defense.
Read moreIn this part, we will discuss types of threat intelligence and several use cases in real-world scenarios.
Types of Threat Intelligence
There are 3 types of threat intelligence:
Read moreWhat is Threat Intelligence?
Digital technologies facilitate automation and greater connectivity in nearly every industry today. This is a great boon, undoubtedly. However, they have also brought risks in the form of cyberattacks. Threat
Read moreTop 4 Challenges In Data Security
Data has completely changed the way businesses, individuals, and even governments operate and just like any other incredibly valuable resource, it is quite difficult to protect. Being a digital asset, there are a lot of threats that data needs to be
Read moreBest Practices for Modern SOC
No matter how large or small of a corporation a Security Operations Center (SOC) is located in the purpose remains the same. However, as things on the cybersecurity front are changing SOC's and security analysts need to modify their approach to
Read moreCybercrime has become a daily occurrence struggle for both businesses and individuals. Phishing, in particular, is a significant cybersecurity menace. The reason being that phishing is, according to the Digital Guardian, the most common social
Read more