Alan Foltyn

About Alan Foltyn

This author has not yet filled in any details.
So far Alan Foltyn has created 4 blog entries.

Using technology to fast track compliance in an e-Commerce company

E Com Security Solutions helped an e-Commerce Organization to modernize and reinvent its compliance risk management across its global footprint. The Challenge One of the world’s most prominent tech leaders sought help controlling and organizing a torrent of transaction data from around the globe. The organization is known for innovation and business infrastructure, spanning cloud [...]

By |2025-02-20T08:14:54+00:00February 20th, 2025|Case Studies, regulatory compliance|Comments Off on Using technology to fast track compliance in an e-Commerce company

Application Threat Modeling

Application security is a multilayered approach that requires a combination of technical controls, secure development practices, user awareness, and proactive monitoring. It should be considered at the earliest stage of the software development lifecycle. Threat modelling evaluates information affecting an application's security and organizes it into a structured representation to define effective countermeasures to mitigate [...]

By |2025-02-13T11:22:12+00:00October 13th, 2024|Application Security, Knowledge Base|Comments Off on Application Threat Modeling

Key Stages of Threat Modeling

There may be security mechanisms such as firewalls and intrusion detection systems protecting the network layer. However, Application-level threats and vulnerabilities may not be stopped or detected. Threat Modelling aims to optimize application security by analyzing potential threats, identifying countermeasures, and reducing fielded vulnerabilities. A good balance between security and usability is necessary. Below are [...]

By |2025-02-13T11:37:45+00:00September 12th, 2024|Application Security, Knowledge Base|Comments Off on Key Stages of Threat Modeling

Artificial intelligence risk management

Artificial intelligence (AI) technology fosters the development of machines or applications to perform tasks that usually require humans. While AI is not new, the eruption of massive mega data collection, affordable high-speed cloud computing, and decreasing data storage and computing costs have brought AI into the epicentre of application development to support critical business operations. [...]

By |2025-02-13T10:35:10+00:00February 5th, 2024|federal|Comments Off on Artificial intelligence risk management
Go to Top