Triaxiom Security
Partner with us to meet your Information Security needs.
  • About Us
  • Services
    • Penetration Testing
    • Compliance Audit
    • Strategic Consulting
  • Blog
    • Penetration Test
    • PCI Compliance
    • Best Practice
  • Contact Us
white box application penetration testing
21 May 2020

White Box Application Penetration Testing

We’ve recently seen an uptick in vendor security assessment questionnaires (VSAQs) that are requiring organizations to do white box application penetration testing. Obviously this may be anecdotal, but we thought it would be a good opportunity to discuss what is being asked of you when it comes to white box or clear box testing, and […]

how to write an effective penetration testing rfp
19 May 2020

Writing an Effective Penetration Testing RFP

In the past, we have explored how to find penetration testing Requests For Proposals or RFPs. Today, we are going to explore how to effectively write a penetration testing RFP. Often times, government entities or commercial industry companies are forced to leverage an RFP process to ensure a fair and objective assessment of vendors for […]

sensitive data flows
14 May 2020

How To Identify Sensitive Data Flows In The Enterprise

One of the most helpful things an organization can do when it comes to security is understanding what needs to be protected. An asset inventory is a great starting point, as it should include all of our hardware and the software you’re running. But perhaps more importantly, you really need to know where your sensitive […]

NYDFS Bank Requirement
12 May 2020

PCI Compliance: The Role of the Acquiring Bank

This blog is intended to help merchants understand the various roles in PCI compliance. Specifically, we are going to look at perhaps the most important role: the role of your acquiring bank. Simply put, your acquiring bank is the judge and jury when it comes to meeting PCI compliance. Let’s discuss. Who is My Acquiring […]

remote security assessments
7 May 2020

Remote Security Assessments and Other Alternatives

In light of COVID-19 and the toll it is taking on the business community, today we will discuss the types of remote security assessments that can be performed and some alternative tweaks to assessments to ensure your security program is still evaluated and working properly. Unfortunately with all of the chaos, attackers know that they […]

Traps
5 May 2020

Palo Alto Traps Review

In today’s blog, we’ll be taking a look at Palo Alto Traps, how it compares to traditional signature-based endpoint security, and how Triaxiom fared against it during a recent engagement.  Limitations of traditional endpoint security Every piece of malware has what’s known as a ‘digital signature’ (i.e. a digital footprint) and traditional antivirus (AV) products […]

Lessons from 300
30 Apr 2020

How the Movie ‘300’ Applies to Information Security

This is officially blog number 300! Just to have some fun and learn a few lessons, let’s look at the movie ‘300’ and see if there are any lessons learned we can apply to information security. While this is more of a fun blog than anything else, there a few nuggets we can take away […]

leave passwords in the database
28 Apr 2020

Quick Tip – Leave Passwords in the Database Where They Belong!

Today’s security quick tip is brought to you by some API penetration tests I’ve completed over the past few weeks. One of the things I’ve noticed more and more as organizations are developing and implementing APIs as part of their overall application infrastructure is the presence of “greedy” or overly verbose JSON objects in HTTP […]

two accounts for administrators.
23 Apr 2020

Follow Up Post – Two Accounts for Administrators

Back in September, we wrote a blog on the importance of using two separate accounts for administrators, one user-level and one administrative. If you haven’t read it yet, it does a great job of explaining why it is necessary and why it’s a security best practice. The lower-level user account should have limited permission and […]

security incident lessons learned
21 Apr 2020

Security Incident Lessons Learned Checklist

Today we’re going to put a bow on our series covering different checklists for things you should be thinking about during each of the 5 primary phases of security incident response. We started with the identification phase and how to adequately capture information about a potential security incident to launch an investigation. We then covered […]

«‹ 9 10 11 12›»

Looking for something specific?

Recent Posts

  • web application penetration testingWeb Application Penetration Testing – A Beginner’s Guide
  • external penetration testWhat is an External Penetration Test?
  • why should you prepare for a penetration testWhy Should You Prepare for a Penetration Test?

Categories

Most Discussed

API Penetration Test Best Practice Checklist Cloud Common Vulnerabilities comparison COMPLIANCE configuration review Core Values Cost Current Events Education External Penetration Test firewall HIPAA improvement Incident Response Internal Penetration Test methodology Onsite Assessment Passphrase Passwords Password Security PCI PCI DSS PCI QSA penetration test Physical Penetration Test Problems QSA Quick Tips Regulation Remediation Report Risk ROC SAQ Security Awareness Small Business SMB Social Engineering vetting vulnerability Web Application Penetration Test wireless
Back to top
Triaxiom Security
© 2025 Triaxiom Security, a division of Strata Information Group, Inc. All rights reserved.
Privacy Policy