Blog Back to HomeHome Blog Popular Posts Social Engineering Vishing – Phone Based Social Engineering In our social engineering assessments, we typically utilize three different types of social engineering attacks: vishing, spear phishing, and bulk … By: Matt Miller July 31, 2019 5 Min Read Education What is the GLBA? The Gramm-Leach-Bliley Act or GLBA is also known as the Financial Modernization Act of 1999. The GLBA requires companies defined … By: Kyle Bork March 10, 2020 2 Min Read Current Events How Has Penetration Testing Changed During the Pandemic In today's blog, we are going to look at how penetration testing has changed during the pandemic. With the increase … By: Matt Miller September 22, 2020 2 Min Read Select Category API Penetration TestAWSAzureBest PracticeCertificationsCloudCloud SecurityCompany NewsComparisionCore ValuesCostCurrent EventsDeliverablesEducationExternal Penetration TestFirewall Configuration ReviewGDPR ComplianceHIPAAHITRUSTHost Compliance AuditIncident ResponseInternal Penetration TestIoT Penetration TestingMobile Application Penetration TestingNIST/DFARS ComplianceOracle CloudOSINTPassword AuditPCI CompliancePenetration TestPhysical Penetration TestProblemsQuick TipsRansomwareRed TeamRegulatorySecure SLCSecurity Awareness TrainingSecurity ConsultingSensitive Data MappingSmall BusinessSocial EngineeringTabletop ExercisesUncategorizedVulnerability ManagementVulnerability WalkthroughWeb Application Penetration TestWireless Penetration Test External Penetration Test Everything You Need to Know About an External Penetration Test External penetration tests are one of the most common tests we perform. An external penetration test is often the starting … By: Matt Miller August 28, 2025 4 Min Read External Penetration Test Quick Tips Quick Tips – How to Limit Your Attack Surface A common theme for many of the External Penetration Tests that we perform is unnecessary attack surface exposed to the … By: JR Johnson August 28, 2025 4 Min Read Cloud Cloud Security Security Consulting AWS Security Assessment: What to Expect AWS Security Assessment is equal parts art and science. Are you considering an AWS security assessment? Learn exactly what to … By: Gabriel Tocci July 28, 2025 2 Min Read AWS Best Practice Cloud Cloud Security Quick Tips Security Consulting Common Security Gaps in AWS: How to Lock Down AWS Is your cloud secure? Discover the most common AWS security gaps we uncover during audits, including public resources, IAM misconfigurations, … By: Gabriel Tocci July 22, 2025 2 Min Read Best Practice Cloud Cloud Security Oracle Cloud Quick Tips Security Consulting Oracle Cloud Security Checklist If your organization runs critical workloads in Oracle Cloud Infrastructure (OCI), you know security compliance is non-negotiable. This Oracle Cloud … By: Gabriel Tocci July 16, 2025 3 Min Read Comparision External Penetration Test Internal Penetration Test External vs Internal Penetration Testing – How to Choose With a Limited Budget When planning a penetration test, one of the most common questions organizations face is whether to choose between external vs … By: JR Johnson July 9, 2025 4 Min Read External Penetration Test Penetration Test Does External Penetration Testing Need to Be Conducted “After-Hours”? A question we often receive when scoping an engagement is, “Can my external penetration test be conducted after hours?” The … By: JR Johnson July 8, 2025 3 Min Read Education External Penetration Test OSINT Problems DNS Zone Transfers: A Classic Risk Still Overlooked What are DNS Zone Transfers? While DNS zone transfers may seem like a relic of the past, they remain a … By: Matt Schmidt July 7, 2025 3 Min Read Tabletop Exercises Incident Response Tabletop Exercises: Beyond the Checkbox Many organizations either skip incident response tabletop exercises entirely or settle for off-the-shelf scenarios that lack relevance to their environment. … By: Brian Kirk July 2, 2025 2 Min Read Load more Page 2 of 42«12345...102030...»Last »
Social Engineering Vishing – Phone Based Social Engineering In our social engineering assessments, we typically utilize three different types of social engineering attacks: vishing, spear phishing, and bulk … By: Matt Miller July 31, 2019 5 Min Read
Education What is the GLBA? The Gramm-Leach-Bliley Act or GLBA is also known as the Financial Modernization Act of 1999. The GLBA requires companies defined … By: Kyle Bork March 10, 2020 2 Min Read
Current Events How Has Penetration Testing Changed During the Pandemic In today's blog, we are going to look at how penetration testing has changed during the pandemic. With the increase … By: Matt Miller September 22, 2020 2 Min Read
External Penetration Test Everything You Need to Know About an External Penetration Test External penetration tests are one of the most common tests we perform. An external penetration test is often the starting … By: Matt Miller August 28, 2025 4 Min Read
External Penetration Test Quick Tips Quick Tips – How to Limit Your Attack Surface A common theme for many of the External Penetration Tests that we perform is unnecessary attack surface exposed to the … By: JR Johnson August 28, 2025 4 Min Read
Cloud Cloud Security Security Consulting AWS Security Assessment: What to Expect AWS Security Assessment is equal parts art and science. Are you considering an AWS security assessment? Learn exactly what to … By: Gabriel Tocci July 28, 2025 2 Min Read
AWS Best Practice Cloud Cloud Security Quick Tips Security Consulting Common Security Gaps in AWS: How to Lock Down AWS Is your cloud secure? Discover the most common AWS security gaps we uncover during audits, including public resources, IAM misconfigurations, … By: Gabriel Tocci July 22, 2025 2 Min Read
Best Practice Cloud Cloud Security Oracle Cloud Quick Tips Security Consulting Oracle Cloud Security Checklist If your organization runs critical workloads in Oracle Cloud Infrastructure (OCI), you know security compliance is non-negotiable. This Oracle Cloud … By: Gabriel Tocci July 16, 2025 3 Min Read
Comparision External Penetration Test Internal Penetration Test External vs Internal Penetration Testing – How to Choose With a Limited Budget When planning a penetration test, one of the most common questions organizations face is whether to choose between external vs … By: JR Johnson July 9, 2025 4 Min Read
External Penetration Test Penetration Test Does External Penetration Testing Need to Be Conducted “After-Hours”? A question we often receive when scoping an engagement is, “Can my external penetration test be conducted after hours?” The … By: JR Johnson July 8, 2025 3 Min Read
Education External Penetration Test OSINT Problems DNS Zone Transfers: A Classic Risk Still Overlooked What are DNS Zone Transfers? While DNS zone transfers may seem like a relic of the past, they remain a … By: Matt Schmidt July 7, 2025 3 Min Read
Tabletop Exercises Incident Response Tabletop Exercises: Beyond the Checkbox Many organizations either skip incident response tabletop exercises entirely or settle for off-the-shelf scenarios that lack relevance to their environment. … By: Brian Kirk July 2, 2025 2 Min Read