Blog Back to HomeHome Blog Popular Posts Firewall Configuration Review Two Ways to Avoid Problems With a Firewall Configuration Review A firewall configuration review is one of the safest activities we do as penetration testers. There's no automated scanning, no … By: JR Johnson October 10, 2018 3 Min Read Current Events How Has Penetration Testing Changed During the Pandemic In today's blog, we are going to look at how penetration testing has changed during the pandemic. With the increase … By: Matt Miller September 22, 2020 2 Min Read Education What is the GLBA? The Gramm-Leach-Bliley Act or GLBA is also known as the Financial Modernization Act of 1999. The GLBA requires companies defined … By: Kyle Bork March 10, 2020 2 Min Read Select Category API Penetration TestAWSAzureBest PracticeCertificationsCloudCloud SecurityCompany NewsComparisionCore ValuesCostCurrent EventsDeliverablesEducationExternal Penetration TestFirewall Configuration ReviewGDPR ComplianceHIPAAHITRUSTHost Compliance AuditIncident ResponseInternal Penetration TestIoT Penetration TestingMobile Application Penetration TestingNIST/DFARS ComplianceOracle CloudOSINTPassword AuditPCI CompliancePenetration TestPhysical Penetration TestProblemsQuick TipsRansomwareRed TeamRegulatorySecure SLCSecurity Awareness TrainingSecurity ConsultingSensitive Data MappingSmall BusinessSocial EngineeringTabletop ExercisesUncategorizedVulnerability ManagementVulnerability WalkthroughWeb Application Penetration TestWireless Penetration Test Sensitive Data Mapping Why Data Flow Diagrams and Data Storage Inventories Are Important For any organization, the first step in protecting your assets is understanding what you have. While most companies are pretty … By: JR Johnson September 30, 2019 3 Min Read Education PCI Compliance Small Business What is the Visa Merchant Servicer Self-Identification Program (MSSIP)? What is the Visa Merchant Servicer Self-Identification Program (MSSIP) and how can I get my company included on the list? … By: Kyle Bork September 27, 2019 3 Min Read Education PCI Compliance What’s the Difference Between an SAQ and a RoC? In today's blog, we are going to focus on PCI compliance. If you are being asked to show that you … By: Matt Miller September 25, 2019 3 Min Read Education Penetration Test Tools For OSINT – The Top Four We discussed last week that open source intelligence, or OSINT, is one of the most important phases of an assessment … By: JR Johnson September 23, 2019 3 Min Read Best Practice Education Using Two Accounts for Administrators There is no question that administrators need an account with elevated permissions so they can effectively manage and care for … By: Matt Miller September 20, 2019 2 Min Read Education Small Business What Is The Ohio Data Protection Act? On August 3, 2018, Governor John Kasich signed Senate Bill 220, also known as the “Ohio Data Protection Act“. Unfortunately, this caused some confusion … By: Kyle Bork September 18, 2019 2 Min Read Education OSINT What is OSINT? Conducting OSINT, or open source intelligence, operations refers to the act of gaining information about a target through "open sources." … By: JR Johnson September 16, 2019 2 Min Read Education Penetration Test Usability vs. Security: The Age-Old Battle One of the age-old battles in information security is balancing the trade-offs between usability vs. security. We recently had a … By: Matt Miller September 13, 2019 2 Min Read Education Small Business Penetration Testing RFPs – Tips and Tricks Penetration testing requests for proposals (RFPs) or requests for quotes (RFQs) can be a great way to bid on and … By: Kyle Bork September 11, 2019 2 Min Read Load more Page 20 of 42« First«...10...1819202122...3040...»Last »
Firewall Configuration Review Two Ways to Avoid Problems With a Firewall Configuration Review A firewall configuration review is one of the safest activities we do as penetration testers. There's no automated scanning, no … By: JR Johnson October 10, 2018 3 Min Read
Current Events How Has Penetration Testing Changed During the Pandemic In today's blog, we are going to look at how penetration testing has changed during the pandemic. With the increase … By: Matt Miller September 22, 2020 2 Min Read
Education What is the GLBA? The Gramm-Leach-Bliley Act or GLBA is also known as the Financial Modernization Act of 1999. The GLBA requires companies defined … By: Kyle Bork March 10, 2020 2 Min Read
Sensitive Data Mapping Why Data Flow Diagrams and Data Storage Inventories Are Important For any organization, the first step in protecting your assets is understanding what you have. While most companies are pretty … By: JR Johnson September 30, 2019 3 Min Read
Education PCI Compliance Small Business What is the Visa Merchant Servicer Self-Identification Program (MSSIP)? What is the Visa Merchant Servicer Self-Identification Program (MSSIP) and how can I get my company included on the list? … By: Kyle Bork September 27, 2019 3 Min Read
Education PCI Compliance What’s the Difference Between an SAQ and a RoC? In today's blog, we are going to focus on PCI compliance. If you are being asked to show that you … By: Matt Miller September 25, 2019 3 Min Read
Education Penetration Test Tools For OSINT – The Top Four We discussed last week that open source intelligence, or OSINT, is one of the most important phases of an assessment … By: JR Johnson September 23, 2019 3 Min Read
Best Practice Education Using Two Accounts for Administrators There is no question that administrators need an account with elevated permissions so they can effectively manage and care for … By: Matt Miller September 20, 2019 2 Min Read
Education Small Business What Is The Ohio Data Protection Act? On August 3, 2018, Governor John Kasich signed Senate Bill 220, also known as the “Ohio Data Protection Act“. Unfortunately, this caused some confusion … By: Kyle Bork September 18, 2019 2 Min Read
Education OSINT What is OSINT? Conducting OSINT, or open source intelligence, operations refers to the act of gaining information about a target through "open sources." … By: JR Johnson September 16, 2019 2 Min Read
Education Penetration Test Usability vs. Security: The Age-Old Battle One of the age-old battles in information security is balancing the trade-offs between usability vs. security. We recently had a … By: Matt Miller September 13, 2019 2 Min Read
Education Small Business Penetration Testing RFPs – Tips and Tricks Penetration testing requests for proposals (RFPs) or requests for quotes (RFQs) can be a great way to bid on and … By: Kyle Bork September 11, 2019 2 Min Read