Author: JR Johnson Back to Archives for JR JohnsonHome Archives for JR Johnson Page 4 Select Category API Penetration TestAWSAzureBest PracticeCertificationsCloudCloud SecurityCompany NewsComparisionCore ValuesCostCurrent EventsDeliverablesEducationExternal Penetration TestFirewall Configuration ReviewGDPR ComplianceHIPAAHITRUSTHost Compliance AuditIncident ResponseInternal Penetration TestIoT Penetration TestingMobile Application Penetration TestingNIST/DFARS ComplianceOracle CloudOSINTPassword AuditPCI CompliancePenetration TestPhysical Penetration TestProblemsQuick TipsRansomwareRed TeamRegulatorySecure SLCSecurity Awareness TrainingSecurity ConsultingSensitive Data MappingSmall BusinessSocial EngineeringTabletop ExercisesUncategorizedVulnerability ManagementVulnerability WalkthroughWeb Application Penetration TestWireless Penetration Test Education Incident Response Internal Penetration Test An Introduction to Ransomware In today’s blog, we will do a quick introduction to Ransomware. Ransomware is a form of malware (short for malicious software) … By: JR Johnson July 7, 2020 4 Min Read Vulnerability Walkthrough Web Application Penetration Test File Upload Validation Techniques File upload filtering is an extremely important part of web application security that is also notoriously hard to get right. … By: JR Johnson June 30, 2020 4 Min Read API Penetration Test Most Common Methods of API Authentication Today, we're going to dig into the most common methods of API authentication out there and discuss some of the … By: JR Johnson June 11, 2020 4 Min Read Education Internal Penetration Test Quick Tips Red Team An Introduction to Kerberoasting In today's blog, we will be taking a high-level look at a popular attack called Kerberoasting. Kerberoasting is used by … By: JR Johnson June 9, 2020 2 Min Read Education Web Application Penetration Test Common Web Application Vulnerabilities – JWTs We've been running across a lot of modern web applications lately that have implemented JSON Web Tokens (also known as … By: JR Johnson May 27, 2020 4 Min Read Penetration Test Web Application Penetration Test White Box Application Penetration Testing We've recently seen an uptick in vendor security assessment questionnaires (VSAQs) that are requiring organizations to do white box application … By: JR Johnson May 21, 2020 3 Min Read Sensitive Data Mapping How To Identify Sensitive Data Flows In The Enterprise One of the most helpful things an organization can do when it comes to security is understanding what needs to … By: JR Johnson May 14, 2020 4 Min Read API Penetration Test Quick Tips Quick Tip – Leave Passwords in the Database Where They Belong! Today's security quick tip is brought to you by some API penetration tests I've completed over the past few weeks. … By: JR Johnson April 28, 2020 2 Min Read Incident Response Security Incident Lessons Learned Checklist Today we're going to put a bow on our series covering different checklists for things you should be thinking about … By: JR Johnson April 21, 2020 3 Min Read Load more Page 4 of 16« First«...23456...10...»Last »
Education Incident Response Internal Penetration Test An Introduction to Ransomware In today’s blog, we will do a quick introduction to Ransomware. Ransomware is a form of malware (short for malicious software) … By: JR Johnson July 7, 2020 4 Min Read
Vulnerability Walkthrough Web Application Penetration Test File Upload Validation Techniques File upload filtering is an extremely important part of web application security that is also notoriously hard to get right. … By: JR Johnson June 30, 2020 4 Min Read
API Penetration Test Most Common Methods of API Authentication Today, we're going to dig into the most common methods of API authentication out there and discuss some of the … By: JR Johnson June 11, 2020 4 Min Read
Education Internal Penetration Test Quick Tips Red Team An Introduction to Kerberoasting In today's blog, we will be taking a high-level look at a popular attack called Kerberoasting. Kerberoasting is used by … By: JR Johnson June 9, 2020 2 Min Read
Education Web Application Penetration Test Common Web Application Vulnerabilities – JWTs We've been running across a lot of modern web applications lately that have implemented JSON Web Tokens (also known as … By: JR Johnson May 27, 2020 4 Min Read
Penetration Test Web Application Penetration Test White Box Application Penetration Testing We've recently seen an uptick in vendor security assessment questionnaires (VSAQs) that are requiring organizations to do white box application … By: JR Johnson May 21, 2020 3 Min Read
Sensitive Data Mapping How To Identify Sensitive Data Flows In The Enterprise One of the most helpful things an organization can do when it comes to security is understanding what needs to … By: JR Johnson May 14, 2020 4 Min Read
API Penetration Test Quick Tips Quick Tip – Leave Passwords in the Database Where They Belong! Today's security quick tip is brought to you by some API penetration tests I've completed over the past few weeks. … By: JR Johnson April 28, 2020 2 Min Read
Incident Response Security Incident Lessons Learned Checklist Today we're going to put a bow on our series covering different checklists for things you should be thinking about … By: JR Johnson April 21, 2020 3 Min Read