Author: Matt Miller Back to Archives for Matt MillerHome Archives for Matt Miller Page 3 Select Category API Penetration TestAWSAzureBest PracticeCertificationsCloudCloud SecurityCompany NewsComparisionCore ValuesCostCurrent EventsDeliverablesEducationExternal Penetration TestFirewall Configuration ReviewGDPR ComplianceHIPAAHITRUSTHost Compliance AuditIncident ResponseInternal Penetration TestIoT Penetration TestingMobile Application Penetration TestingNIST/DFARS ComplianceOracle CloudOSINTPassword AuditPCI CompliancePenetration TestPhysical Penetration TestProblemsQuick TipsRansomwareRed TeamRegulatorySecure SLCSecurity Awareness TrainingSecurity ConsultingSensitive Data MappingSmall BusinessSocial EngineeringTabletop ExercisesUncategorizedVulnerability ManagementVulnerability WalkthroughWeb Application Penetration TestWireless Penetration Test Current Events What we Know about the Twitter Hack In this blog, let's take a look at what is sure to be one of the biggest information security events … By: Matt Miller July 21, 2020 3 Min Read IoT Penetration Testing IoT Devices in the Home Today's blog is just a quick update on home security. As a security professional, one of the most common questions … By: Matt Miller June 25, 2020 3 Min Read Education Introduction to Buffer Overflow Attacks In today’s blog, we will be taking a very high-level look at buffer overflow attacks. Attackers exploit buffer overflow vulnerabilities by overwriting … By: Matt Miller June 2, 2020 4 Min Read Best Practice Current Events COVID-19 Attack Surface Implications The COVID-19 pandemic has reshaped our organizations as we know them. For many, they have shifted from an on-site location … By: Matt Miller May 29, 2020 2 Min Read PCI Compliance PCI Compliance: The Role of the Acquiring Bank This blog is intended to help merchants understand the various roles in PCI compliance. Specifically, we are going to look … By: Matt Miller May 12, 2020 3 Min Read Comparision Palo Alto Traps Review In today’s blog, we'll be taking a look at Palo Alto Traps, how it compares to traditional signature-based endpoint security, … By: Matt Miller May 5, 2020 3 Min Read Best Practice Education How the Movie ‘300’ Applies to Information Security This is officially blog number 300! Just to have some fun and learn a few lessons, let's look at the … By: Matt Miller April 30, 2020 3 Min Read Best Practice Follow Up Post – Two Accounts for Administrators Back in September, we wrote a blog on the importance of using two separate accounts for administrators, one user-level and … By: Matt Miller April 23, 2020 2 Min Read Education What is the CIA Triad? Continuing in our key security concept series, this blog will look at the CIA Triad. If you haven't been following, … By: Matt Miller April 16, 2020 3 Min Read Load more Page 3 of 15«12345...10...»Last »
Current Events What we Know about the Twitter Hack In this blog, let's take a look at what is sure to be one of the biggest information security events … By: Matt Miller July 21, 2020 3 Min Read
IoT Penetration Testing IoT Devices in the Home Today's blog is just a quick update on home security. As a security professional, one of the most common questions … By: Matt Miller June 25, 2020 3 Min Read
Education Introduction to Buffer Overflow Attacks In today’s blog, we will be taking a very high-level look at buffer overflow attacks. Attackers exploit buffer overflow vulnerabilities by overwriting … By: Matt Miller June 2, 2020 4 Min Read
Best Practice Current Events COVID-19 Attack Surface Implications The COVID-19 pandemic has reshaped our organizations as we know them. For many, they have shifted from an on-site location … By: Matt Miller May 29, 2020 2 Min Read
PCI Compliance PCI Compliance: The Role of the Acquiring Bank This blog is intended to help merchants understand the various roles in PCI compliance. Specifically, we are going to look … By: Matt Miller May 12, 2020 3 Min Read
Comparision Palo Alto Traps Review In today’s blog, we'll be taking a look at Palo Alto Traps, how it compares to traditional signature-based endpoint security, … By: Matt Miller May 5, 2020 3 Min Read
Best Practice Education How the Movie ‘300’ Applies to Information Security This is officially blog number 300! Just to have some fun and learn a few lessons, let's look at the … By: Matt Miller April 30, 2020 3 Min Read
Best Practice Follow Up Post – Two Accounts for Administrators Back in September, we wrote a blog on the importance of using two separate accounts for administrators, one user-level and … By: Matt Miller April 23, 2020 2 Min Read
Education What is the CIA Triad? Continuing in our key security concept series, this blog will look at the CIA Triad. If you haven't been following, … By: Matt Miller April 16, 2020 3 Min Read