Triaxiom Security
Partner with us to meet your Information Security needs.
  • About Us
  • Services
  • Blog
  • Contact Us
silver bullet

There is No Silver Bullet in Security

In folklore, the silver bullet is the only thing that can effectively kill a werewolf. Sure, you can trap a werewolf and hide til daylight or concoct some other workaround, but if you are lucky enough to have a silver bullet that is the one-stop shop. You can kill the werewolf and not have to […]

What is the DHS Cyber Hunt and Incident Response Teams Act?

What is the DHS Cyber Hunt and Incident Response Teams Act?

On September 24th, 2019, Senate Bill S.315 aka the “DHS Cyber Hunt and Incident Response Teams Act of 2019” was passed unanimously. The legislation seeks to amend the Homeland Security Act of 2002, authorizing DHS’ National Cybersecurity and Communications Integration Center (NCCIC) to permanently operate cyber hunt and incident response teams that can aid federal […]

Cyber Security Awareness Month

Cyber Security Awareness Month – 2019

In the spirit of kicking off Cyber Security Awareness Month, today we take a look back at useful tricks and tips to help improve your organization’s cyber security awareness. Remember, you are only as secure as your weakest link, which tends to be the people working in your organization. Password Management As you might expect, […]

data flow diagrams

Why Data Flow Diagrams and Data Storage Inventories Are Important

For any organization, the first step in protecting your assets is understanding what you have. While most companies are pretty good at inventorying their physical assets (e.g. computers, devices, monitors), they are overlooking another critical asset they should be considering: their data. Understanding how what sensitive data flows throughout your network, who has access to […]

What is the Visa MSSIP

What is the Visa Merchant Servicer Self-Identification Program (MSSIP)?

What is the Visa Merchant Servicer Self-Identification Program (MSSIP) and how can I get my company included on the list? This is a great question and today we will explore what this is, the benefits for your company, and how you can get on the list. What is the Visa MSSIP? The Visa MSSIP was […]

difference between an SAQ and a RoC

What’s the Difference Between an SAQ and a RoC?

In today’s blog, we are going to focus on PCI compliance. If you are being asked to show that you are handling credit card information appropriately and are compliant with the PCI Data Security Standard (DSS), there are two ways this can be done, a Self Assessment Questionnaire (SAQ) or a Report on Compliance (RoC). […]

«< 3 4 5 6 7 >»

Looking for something specific?

Join our Newsletter!

Don’t be left in the dark. Enter your email below and become part of our newsletter. We promise not to spam you!

Recent Posts

  • denial of serviceWhat is a Denial of Service Attack?
  • Cybersecurity Maturity Model CertificationWhat is the Cybersecurity Maturity Model Certification (CMMC)?
  • What is the difference between HIPAA and HITRUSTWhat is the Difference Between HIPAA and HITRUST?

Categories

Most Discussed

Best Practice Cloud comparison COMPLIANCE configuration review Core Values Cost Current Events Data Breach Deliverables Education External Penetration Test firewall HIPAA improvement Incident Response Internal Penetration Test methodology NIST Partnership Passphrase password Passwords Password Security password spray PCI PCI DSS PCI QSA penetration test Physical Penetration Test Problems Quick Tips Regulation Remediation Report Risk ROC Small Business SMB Social Engineering Third Party vetting vulnerability Web Application Penetration Test wireless

Latest Tweets

  • Russia's Secret Intelligence Agency Hacked: 'Largest Data Breach In Its History' forbes.com/sites/zakdoffm…
    5 months ago
  • Report: Equifax expected to reach $650M settlement over data breach axios.com/report-equifax…
    5 months ago
  • For our Friday blog, we look at what separates Triaxiom Security from others. Check it out:… twitter.com/i/web/status/1…
    5 months ago
Follow Us on Twitter
Triaxiom Security
© 2018 Triaxiom Security, LLC. All rights reserved.
Privacy Policy
  • About Us
  • Services
  • Blog
  • Contact Us

Recent Posts

  • What is a Denial of Service Attack? December 11, 2019
  • What is the Cybersecurity Maturity Model Certification (CMMC)? December 9, 2019
  • What is the Difference Between HIPAA and HITRUST? December 6, 2019
  • InfoSec Gifts for Family December 4, 2019
  • Threat Modeling for Penetration Testers December 2, 2019

Latest Tweets

  • Today we explore the Cybersecurity Maturity Model Certification or "CMMC" and the impact on anyone working on gover… twitter.com/i/web/status/1…
    2 days ago
  • So what exactly is the difference between HIPAA and HITRUST?!??! Today we discuss. #HIPAA #HITRUST #infosec #CISO ow.ly/py4l50xtTSr
    5 days ago
  • Need a Christmas gift for that "security person" in your family? Have a paranoid relative and not sure what to get?… twitter.com/i/web/status/1…
    1 week ago
Formal Risk Assessment

A formal risk assessment evaluates the threats to your organization, the vulnerabilities of your network, and the security controls you have in place to protect your network. A risk assessment correlates information from your security assessments and evaluates the overall risk to your organization to help drive strategic decisions.

Best Practice Gap Analysis

Our best practice gap analysis is an interview based review of your information security program. We use the Center for Internet Security (CIS) Top 20 Critical Security Controls to comprehensively review all aspects of your information security program. Some of the areas covered include:

  • Inventory and asset management
  • System hardening
  • Account management and principle of least privilege
  • Disaster recovery and continuity of operations
  • Incident response
Customized Security Consulting

Have a need not mentioned? Contact us today to customize an assessment or package to meet your security needs. Our engineers have a wealth of experience performing a wide variety of assessments, and we’re confident they can meet your needs. Let us know how we can help.

Incident Response and Malware Analysis

When you suspect you have been breached, knowing exactly how it happened and what was affected can be difficult to discern. Our certified engineers can assist you with the incident response process, ensuring the malware is removed and normal business operations are restored. Moreover, our root-cause analysis will attempt to determine how the breach was possible and steps to take to prevent it from happening again. Moreover, we will evaluate the malware including:

  • Open-source intelligence – We will evaluate the hash and any unique strings in the malware to see if they match known-malware signatures.
  • Reverse-Engineering – Where possible, we will recreate the incident with advanced process monitors and determine the exact malware behavior.
  • Log Analysis – Using the information gathered, we are now able to analyze the logs of affected devices to determine if the breach spread to other machines.
Security Policy Review and Creation

Comprehensive security policies written by security professionals. Our policies are designed to meet your compliance needs while optimizing your business requirements. Some of the policies we can help with include:

  • Access Control Policy
  • Acceptable Use
  • Disaster Recovery Plan
  • Password Policy
  • Incident Response Plan
Internet of Things Security Assessment

Developing a secure IoT solution depends on a number of security considerations. This assessment will evaluate the IoT device and its associated infrastructure against common attacks. It can include an evaluation of the edge device, the gateway, the cloud infrastructure, and/or any mobile applications. Our engineers will evaluate your IoT Device utilizing the OWASP IoT Framework Assessment methodology.

Cloud Security Assessment

This assessment is an evaluation of your organization’s cloud infrastructure for security vulnerabilities. Our engineers will assist you in evaluating the unique security responsibilities associated with cloud computing. Individual services can include cloud application assessments, cloud infrastructure penetration testing, host/OS configuration audits, and cloud architecture reviews.

Best Practice Gap Analysis

Our best practice gap analysis is an interview based review of your information security program. We use the Center for Internet Security (CIS) Top 20 Critical Security Controls to comprehensively review all aspects of your information security program. Some of the areas covered include:

  • Inventory and asset management
  • System hardening
  • Account management and principle of least privilege
  • Disaster recovery and continuity of operations
  • Incident response
Password Audit

During a password audit, our engineers will evaluate the strength of passwords currently in use in your organization. We will take a dump of your employees’ hashed credentials and run them through a password cracker to identify weak passwords and common usage patterns. This audit can be used to justify stronger password policies, used in security awareness training to improve password choice among employees, and used to help understand the organization’s overall risk if an attacker is able to capture hashed credentials.

Firewall Audit

A firewall audit is a manual inspection of your firewall using the Center for Internet Security (CIS) benchmark and device-specific best practices. In addition, our engineer will review the firewall rules, searching for overly specific rules, proper rule sequencing, or other gaps in your security posture. Finally, the firewall audit will include network scanning to validate its effectiveness.

Host Compliance Audit

A host compliance audit involves the manual inspection of a workstation, server, or network device using the Center for Internet Security (CIS) benchmark and device-specific security best practices. This assessment will identify the security holes in your system and provide specific actions to take to harden the device.

Vulnerability Scanning

Vulnerability scanning is a regular, automated process that identifies the potential points of compromise on a network. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures. Our engineers will conduct this scan for you and use our expertise to remove false positives and produce a risk-prioritized report.

Physical Penetration Test

A physical penetration test is an assessment of the physical security of your premises. Our engineers will attempt to gain access to your facility by identifying weaknesses and/or using social engineering. Once inside, our engineers will attempt to gather sensitive information, gain access to sensitive areas such as the data center, and attempt to gain internal network access.

Social Engineering Assessment

This assessment is designed to target and take advantage of the human-element to gain access to your network. This is done using a variety of methods to get an employee to click on something they shouldn’t, enter their credentials or otherwise provide them when they shouldn’t, or divulge information that may assist an attacker in breaching your network. The goal for the engineer performing this assessment is to gain information that may assist an attacker in future attacks, gather credentials, or gain a foothold on the internal network. This assessment will include:

  • Phone-based attacks
  • Spear phishing attacks
  • Bulk phishing attacks
External Penetration Test

An external penetration test emulates an attacker trying to break into your network from the outside. The goal of the engineer performing this assessment is to breach the perimeter and prove they have internal network access. This test includes:

  • Open source reconnaissance against the organization
  • Full port scan covering all TCP ports and the top 1,000 UDP ports of the targets in scope
  • Full vulnerability scan of the targets
  • Manual and automated exploit attempts
  • Password attacks

Internal Penetration Test

An internal penetration test emulates an attacker on the inside of your network. This could be either an attacker who is successful in breaching the perimeter through another method or a malicious insider. The goal of the engineer in this module is to gain root and/or domain administrator level access on the network, and gain access to sensitive files. Activities include:

  • Active and Passive network reconnaissance including traffic sniffing, port scanning, LDAP enumeration, SMB enumeration, etc.
  • Vulnerability scan on all in-scope targets
  • Spoofing attacks such as ARP cache poisoning, LLMNR/NBNS spoofing, etc.
  • Manual and automated exploit attempts
  • Shared resource enumeration
  • Password attacks
  • Pivoting attacks
Wireless Penetration Test

A wireless penetration test is a comprehensive evaluation of the wireless networks in your organization using automated and manual methods. Areas covered include:

  • Password attacks
  • WEP/WPA cracking
  • Guest wireless segmentation checks
  • Traffic sniffing attacks
  • SSID spoofing
  • Rogue access point discovery
Web Application Penetration Test

A web application penetration test is an in-depth penetration test on both the unauthenticated and authenticated portions of your website. The engineer will test for all of the OWASP Top-10 critical security flaws, as well as a variety of other potential vulnerabilities based on security best practice. Activities include:

  • Website mapping techniques such as spidering
  • Directory enumeration
  • Automated and manual tests for injection flaws on all input fields
  • Directory traversal testing
  • Malicious file upload and remote code execution
  • Password attacks and testing for vulnerabilities in the authentication mechanisms
  • Session attacks, including hijacking, fixation, and spoofing attempts
  • Other tests depending on specific site content and languages
Contact Us