Remove threat-modeling-with-questionnaires
article thumbnail

Quick Threat Model Links October 2019

Adam Shostack

Trail of Bits released a threat model for Kubernetes. Continuum has a blog and a spreadsheet on threat modeling lambdas (as a category, not specific to Amazon Lambda), and also a post on threat modeling with CAPEC. There’s some context from Aaron Small, who made the project happen.

189
189
article thumbnail

The Best 10 Vendor Risk Management Tools

Centraleyes

Centraleyes collects real-time threat intelligence from various sources, providing unparalleled visibility into potential vulnerabilities and gaps. It offers pre-built and custom questionnaires for rapid vendor risk assessment and daily risk scores generated for each vendor through its Portfolio Risk Matrix feature.

Risk 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unravelling the Web: AI’s Tangled Web of Prompt Injection Woes

LRQA Nettitude Labs

Your website might start acting like it’s possessed, throwing out recommendations that make no sense and, more alarmingly, posing a significant security threat. It can personalise recommendations, offer snazzy customer support, and basically take care of the dull stuff. How AI Turns Sour But wait for it – here comes the dark twist.

article thumbnail

CMMC v2.0 vs NIST 800-171: Understanding the Differences

Centraleyes

With over 250,000+ DIB companies and their subcontractors involved in the sector, including domestic and foreign entities, the supply chain presents a huge threat to sensitive federal and unclassified information, and ultimately, to national security. military requirements.

article thumbnail

The 11 Best GRC Tools for 2024

Centraleyes

R is for Real-Time Risk Improved real-time risk monitoring and identification capabilities using modern technologies, including alerts and notifications, allow faster response to a dynamic threat landscape. With so many GRC tools available, figuring out which suits your organization can be challenging.

Risk 52
article thumbnail

PCI Audit – Checklist & Requirements

Centraleyes

released in early 2022, comes with some new controls to meet the dynamic cybersecurity threats and developments. is more responsive to the dynamic nature of payments and the threat environment.” This version is designed to be more responsive to the dynamic nature of payment processes and the evolving threat landscape.