Author: JR Johnson Back to Archives for JR JohnsonHome Archives for JR Johnson Page 7 Select Category API Penetration TestAWSAzureBest PracticeCertificationsCloudCloud SecurityCompany NewsComparisionCore ValuesCostCurrent EventsDeliverablesEducationExternal Penetration TestFirewall Configuration ReviewGDPR ComplianceHIPAAHITRUSTHost Compliance AuditIncident ResponseInternal Penetration TestIoT Penetration TestingMobile Application Penetration TestingNIST/DFARS ComplianceOracle CloudOSINTPassword AuditPCI CompliancePenetration TestPhysical Penetration TestProblemsQuick TipsRansomwareRed TeamRegulatorySecure SLCSecurity Awareness TrainingSecurity ConsultingSensitive Data MappingSmall BusinessSocial EngineeringTabletop ExercisesUncategorizedVulnerability ManagementVulnerability WalkthroughWeb Application Penetration TestWireless Penetration Test Education Web Application Penetration Test Common Web Application Vulnerabilities – Authentication Weaknesses As we continue our mini-series addressing some of the most common web application vulnerabilities we see during assessments, we turn … By: JR Johnson November 14, 2019 3 Min Read Education Web Application Penetration Test Common Web Application Vulnerabilities – Authorization Bypass As we continue to try and share knowledge we've gained in our time performing penetration testing, we're going to focus … By: JR Johnson November 12, 2019 3 Min Read Education Common Web Application Vulnerabilities – Username Enumeration Throughout our assessments, we get the opportunity to work with a wide variety of clients and see a ton of … By: JR Johnson November 4, 2019 3 Min Read IoT Penetration Testing What is IoT Penetration Testing? With the rise of the Internet of Things (IoT) and Internet-connected devices becoming more pervasive in every organization, it makes … By: JR Johnson October 21, 2019 3 Min Read Education What Is Shadow IT and How Can You Control It? Shadow IT is a somewhat recent and fancy term that has been given to any software, hardware, or technology in … By: JR Johnson October 18, 2019 4 Min Read Best Practice Web Application Penetration Test What is OWASP? Such a simple question, but it has many different answers, all of which can be important to your understanding of … By: JR Johnson October 10, 2019 3 Min Read Sensitive Data Mapping Why Data Flow Diagrams and Data Storage Inventories Are Important For any organization, the first step in protecting your assets is understanding what you have. While most companies are pretty … By: JR Johnson September 30, 2019 3 Min Read Education Penetration Test Tools For OSINT – The Top Four We discussed last week that open source intelligence, or OSINT, is one of the most important phases of an assessment … By: JR Johnson September 23, 2019 3 Min Read Education OSINT What is OSINT? Conducting OSINT, or open source intelligence, operations refers to the act of gaining information about a target through "open sources." … By: JR Johnson September 16, 2019 2 Min Read Load more Page 7 of 16« First«...56789...»Last »
Education Web Application Penetration Test Common Web Application Vulnerabilities – Authentication Weaknesses As we continue our mini-series addressing some of the most common web application vulnerabilities we see during assessments, we turn … By: JR Johnson November 14, 2019 3 Min Read
Education Web Application Penetration Test Common Web Application Vulnerabilities – Authorization Bypass As we continue to try and share knowledge we've gained in our time performing penetration testing, we're going to focus … By: JR Johnson November 12, 2019 3 Min Read
Education Common Web Application Vulnerabilities – Username Enumeration Throughout our assessments, we get the opportunity to work with a wide variety of clients and see a ton of … By: JR Johnson November 4, 2019 3 Min Read
IoT Penetration Testing What is IoT Penetration Testing? With the rise of the Internet of Things (IoT) and Internet-connected devices becoming more pervasive in every organization, it makes … By: JR Johnson October 21, 2019 3 Min Read
Education What Is Shadow IT and How Can You Control It? Shadow IT is a somewhat recent and fancy term that has been given to any software, hardware, or technology in … By: JR Johnson October 18, 2019 4 Min Read
Best Practice Web Application Penetration Test What is OWASP? Such a simple question, but it has many different answers, all of which can be important to your understanding of … By: JR Johnson October 10, 2019 3 Min Read
Sensitive Data Mapping Why Data Flow Diagrams and Data Storage Inventories Are Important For any organization, the first step in protecting your assets is understanding what you have. While most companies are pretty … By: JR Johnson September 30, 2019 3 Min Read
Education Penetration Test Tools For OSINT – The Top Four We discussed last week that open source intelligence, or OSINT, is one of the most important phases of an assessment … By: JR Johnson September 23, 2019 3 Min Read
Education OSINT What is OSINT? Conducting OSINT, or open source intelligence, operations refers to the act of gaining information about a target through "open sources." … By: JR Johnson September 16, 2019 2 Min Read