Blog Back to HomeHome Blog Popular Posts Incident Response Security Incident Containment Checklist We've written previously about some helpful checklists for small-medium sized businesses about their incident response process in general and for … By: JR Johnson March 27, 2020 3 Min Read Penetration Test Quick Tips Small Business What to Look For in a Penetration Testing Proposal? A penetration testing proposal or quote for penetration testing services serves two primary purposes. The first, obviously, is to provide … By: Kyle Bork May 6, 2019 2 Min Read Internal Penetration Test Vulnerability Walkthrough Vulnerability Walkthrough – NBNS and LLMNR Spoofing In this blog, we are going to walk through one of the most common ways we get an initial foothold … By: Matt Miller March 20, 2019 4 Min Read Select Category API Penetration TestAWSAzureBest PracticeCertificationsCloudCloud SecurityCompany NewsComparisionCore ValuesCostCurrent EventsDeliverablesEducationExternal Penetration TestFirewall Configuration ReviewGDPR ComplianceHIPAAHITRUSTHost Compliance AuditIncident ResponseInternal Penetration TestIoT Penetration TestingMobile Application Penetration TestingNIST/DFARS ComplianceOracle CloudOSINTPassword AuditPCI CompliancePenetration TestPhysical Penetration TestProblemsQuick TipsRansomwareRed TeamRegulatorySecure SLCSecurity Awareness TrainingSecurity ConsultingSensitive Data MappingSmall BusinessSocial EngineeringTabletop ExercisesUncategorizedVulnerability ManagementVulnerability WalkthroughWeb Application Penetration TestWireless Penetration Test Best Practice Web Application Penetration Test What is OWASP? Such a simple question, but it has many different answers, all of which can be important to your understanding of … By: JR Johnson October 10, 2019 3 Min Read Education There is No Silver Bullet in Security In folklore, the silver bullet is the only thing that can effectively kill a werewolf. Sure, you can trap a … By: Matt Miller October 8, 2019 2 Min Read Current Events What is the DHS Cyber Hunt and Incident Response Teams Act? On September 24th, 2019, Senate Bill S.315 aka the "DHS Cyber Hunt and Incident Response Teams Act of 2019" was … By: Kyle Bork October 4, 2019 2 Min Read Quick Tips Cyber Security Awareness Month – 2019 In the spirit of kicking off Cyber Security Awareness Month, today we take a look back at useful tricks and … By: Kyle Bork October 2, 2019 2 Min Read Sensitive Data Mapping Why Data Flow Diagrams and Data Storage Inventories Are Important For any organization, the first step in protecting your assets is understanding what you have. While most companies are pretty … By: JR Johnson September 30, 2019 3 Min Read Education PCI Compliance Small Business What is the Visa Merchant Servicer Self-Identification Program (MSSIP)? What is the Visa Merchant Servicer Self-Identification Program (MSSIP) and how can I get my company included on the list? … By: Kyle Bork September 27, 2019 3 Min Read Education PCI Compliance What’s the Difference Between an SAQ and a RoC? In today's blog, we are going to focus on PCI compliance. If you are being asked to show that you … By: Matt Miller September 25, 2019 3 Min Read Education Penetration Test Tools For OSINT – The Top Four We discussed last week that open source intelligence, or OSINT, is one of the most important phases of an assessment … By: JR Johnson September 23, 2019 3 Min Read Best Practice Education Using Two Accounts for Administrators There is no question that administrators need an account with elevated permissions so they can effectively manage and care for … By: Matt Miller September 20, 2019 2 Min Read Load more Page 19 of 41« First«...10...1718192021...3040...»Last »
Incident Response Security Incident Containment Checklist We've written previously about some helpful checklists for small-medium sized businesses about their incident response process in general and for … By: JR Johnson March 27, 2020 3 Min Read
Penetration Test Quick Tips Small Business What to Look For in a Penetration Testing Proposal? A penetration testing proposal or quote for penetration testing services serves two primary purposes. The first, obviously, is to provide … By: Kyle Bork May 6, 2019 2 Min Read
Internal Penetration Test Vulnerability Walkthrough Vulnerability Walkthrough – NBNS and LLMNR Spoofing In this blog, we are going to walk through one of the most common ways we get an initial foothold … By: Matt Miller March 20, 2019 4 Min Read
Best Practice Web Application Penetration Test What is OWASP? Such a simple question, but it has many different answers, all of which can be important to your understanding of … By: JR Johnson October 10, 2019 3 Min Read
Education There is No Silver Bullet in Security In folklore, the silver bullet is the only thing that can effectively kill a werewolf. Sure, you can trap a … By: Matt Miller October 8, 2019 2 Min Read
Current Events What is the DHS Cyber Hunt and Incident Response Teams Act? On September 24th, 2019, Senate Bill S.315 aka the "DHS Cyber Hunt and Incident Response Teams Act of 2019" was … By: Kyle Bork October 4, 2019 2 Min Read
Quick Tips Cyber Security Awareness Month – 2019 In the spirit of kicking off Cyber Security Awareness Month, today we take a look back at useful tricks and … By: Kyle Bork October 2, 2019 2 Min Read
Sensitive Data Mapping Why Data Flow Diagrams and Data Storage Inventories Are Important For any organization, the first step in protecting your assets is understanding what you have. While most companies are pretty … By: JR Johnson September 30, 2019 3 Min Read
Education PCI Compliance Small Business What is the Visa Merchant Servicer Self-Identification Program (MSSIP)? What is the Visa Merchant Servicer Self-Identification Program (MSSIP) and how can I get my company included on the list? … By: Kyle Bork September 27, 2019 3 Min Read
Education PCI Compliance What’s the Difference Between an SAQ and a RoC? In today's blog, we are going to focus on PCI compliance. If you are being asked to show that you … By: Matt Miller September 25, 2019 3 Min Read
Education Penetration Test Tools For OSINT – The Top Four We discussed last week that open source intelligence, or OSINT, is one of the most important phases of an assessment … By: JR Johnson September 23, 2019 3 Min Read
Best Practice Education Using Two Accounts for Administrators There is no question that administrators need an account with elevated permissions so they can effectively manage and care for … By: Matt Miller September 20, 2019 2 Min Read