Author: JR Johnson Back to Archives for JR JohnsonHome Archives for JR Johnson Page 2 Select Category API Penetration TestAWSAzureBest PracticeCertificationsCloudCloud SecurityCompany NewsComparisionCore ValuesCostCurrent EventsDeliverablesEducationExternal Penetration TestFirewall Configuration ReviewGDPR ComplianceHIPAAHITRUSTHost Compliance AuditIncident ResponseInternal Penetration TestIoT Penetration TestingMobile Application Penetration TestingNIST/DFARS ComplianceOracle CloudOSINTPassword AuditPCI CompliancePenetration TestPhysical Penetration TestProblemsQuick TipsRansomwareRed TeamRegulatorySecure SLCSecurity Awareness TrainingSecurity ConsultingSensitive Data MappingSmall BusinessSocial EngineeringTabletop ExercisesUncategorizedVulnerability ManagementVulnerability WalkthroughWeb Application Penetration TestWireless Penetration Test Current Events CarolinaCon This Weekend! After a brief hiatus last year due to the COVID-19 pandemic, CarolinaCon is back April 23 – 25, 2021. This … By: JR Johnson April 22, 2021 2 Min Read Security Awareness Training Security Awareness Training Options One of the cyber security related activities that most, if not all, organizations should be doing on a regular basis … By: JR Johnson March 17, 2021 4 Min Read Education Wireless Penetration Test OSWP Course Review Having recently passed the OSCP, I was looking for my next certification. I spent several weeks weighing the different options. … By: JR Johnson March 3, 2021 4 Min Read Security Consulting Security Consulting – What Is It and Why You Need It Many organizations, especially small-to-medium sized businesses, may feel overwhelmed when it comes to information security. With all of the news … By: JR Johnson February 10, 2021 2 Min Read Cloud Vulnerability Management AWS Vulnerability Scanning Best Practices We get a decent amount of questions regarding the right approach to both penetration testing in the cloud and vulnerability … By: JR Johnson January 27, 2021 3 Min Read Education What’s the Difference Between a Formal and Informal Risk Assessment? Risk assessments are a way of reviewing your assets, the threats to those assets, any vulnerabilities or conditions that leave … By: JR Johnson January 13, 2021 3 Min Read Vulnerability Management Why are Vulnerability Management Tools Important? Vulnerability management programs and the vulnerability management tools that support these processes are becoming more and more important to organizations. … By: JR Johnson January 6, 2021 4 Min Read Education What is Authentication? A common term used in many different industries is authentication. In information security specifically, authentication is the process of determining … By: JR Johnson November 19, 2020 3 Min Read Education Small Business Social Engineering Social Engineering in the Age of COVID-19 In today’s blog, we will be discussing social engineering attacks in the age of COVID-19. Social Engineering is a popular … By: JR Johnson October 29, 2020 3 Min Read Load more Page 2 of 16«12345...10...»Last »
Current Events CarolinaCon This Weekend! After a brief hiatus last year due to the COVID-19 pandemic, CarolinaCon is back April 23 – 25, 2021. This … By: JR Johnson April 22, 2021 2 Min Read
Security Awareness Training Security Awareness Training Options One of the cyber security related activities that most, if not all, organizations should be doing on a regular basis … By: JR Johnson March 17, 2021 4 Min Read
Education Wireless Penetration Test OSWP Course Review Having recently passed the OSCP, I was looking for my next certification. I spent several weeks weighing the different options. … By: JR Johnson March 3, 2021 4 Min Read
Security Consulting Security Consulting – What Is It and Why You Need It Many organizations, especially small-to-medium sized businesses, may feel overwhelmed when it comes to information security. With all of the news … By: JR Johnson February 10, 2021 2 Min Read
Cloud Vulnerability Management AWS Vulnerability Scanning Best Practices We get a decent amount of questions regarding the right approach to both penetration testing in the cloud and vulnerability … By: JR Johnson January 27, 2021 3 Min Read
Education What’s the Difference Between a Formal and Informal Risk Assessment? Risk assessments are a way of reviewing your assets, the threats to those assets, any vulnerabilities or conditions that leave … By: JR Johnson January 13, 2021 3 Min Read
Vulnerability Management Why are Vulnerability Management Tools Important? Vulnerability management programs and the vulnerability management tools that support these processes are becoming more and more important to organizations. … By: JR Johnson January 6, 2021 4 Min Read
Education What is Authentication? A common term used in many different industries is authentication. In information security specifically, authentication is the process of determining … By: JR Johnson November 19, 2020 3 Min Read
Education Small Business Social Engineering Social Engineering in the Age of COVID-19 In today’s blog, we will be discussing social engineering attacks in the age of COVID-19. Social Engineering is a popular … By: JR Johnson October 29, 2020 3 Min Read