Newsroom
Avocado newsroom

Blogs, solutions, events, news, and more.

How Threat Modeling Aligns with Security Standards – A Guide for CISOs

In the role of a CISO, ensuring that your organization’s security program aligns with leading Information security standards and control frameworks are essential for managing... Learn more
AI Blog Events IoT IoT Security News Resources Threat modeling
Tags
Reset filters
gigo challenge

The GIGO Challenge in AI-Based Threat Modeling—and How to Solve It

Introduction to Threat Modeling Threat modeling is a foundational practice in secure software engineering. It is the process of systematically identifying, evaluating, and mitigating potential...
Learn more

How Threat Modeling Aligns with Security Standards – A Guide for CISOs

In the role of a CISO, ensuring that your organization’s security program aligns with leading Information security standards and control frameworks are essential for managing...
Learn more

Let’s meet at OWASP Meetup

Join us on, March 25, 2025, at 5:30 PM at the KPMG, Santa Clara office for an evening of networking and learning. This in-person event...
Learn more
PASTA and Threat modeling

Risk-Based Threat Modeling with PASTA and Avocado as an Automated Tool

Risk-Based Threat Modeling with PASTA and Avocado as an Automated Tool This summary explores Risk-Based Threat Modeling through the Process for Attack Simulation and Threat...
Learn more

The Critical Importance of IoT Security in Manufacturing

The Importance of IoT and What are the Threats to PLCs The Internet of Things (IoT) has revolutionized the manufacturing industry by connecting factory floors,...
Learn more
Avocado Welcomes Cybersecurity Visionary Colin Mc Hugo

Avocado Expands into Europe, Welcomes Cybersecurity Visionary Colin Mc Hugo

In a strategic move to broaden its footprint, Avocado Systems, a trailblazer in cybersecurity innovations, has announced its expansion into the European market. This expansion...
Learn more
How Artificial Intelligence is Transforming Application Security

How Artificial Intelligence is Transforming Application Security

Introduction In recent years, the landscape of cybersecurity has been dramatically reshaped by high-profile breaches and attacks. The 2017 Equifax data breach exposed the personal...
Learn more
Advanced Persistent Threats

Advanced Persistent Threats, What They Are, How They Work, And Examples

In short, APTs or advanced persistent threats are a broad category describing different attack campaigns during which the intruders manage to create a long-term illicit...
Learn more
Supply Chain Attacks

What Are Supply Chain Attacks, Examples, And How To Prevent Them

Supply chain attacks have become more prevalent lately to the point that they managed to damage vital US infrastructures in 2021. As a result, the...
Learn more
Load more