Triaxiom Security
Partner with us to meet your Information Security needs.
  • About Us
  • Services
    • Penetration Testing
    • Compliance Audit
    • Strategic Consulting
  • Blog
    • Penetration Test
    • PCI Compliance
    • Best Practice
  • Contact Us
Traps
5 May 2020

Palo Alto Traps Review

In today’s blog, we’ll be taking a look at Palo Alto Traps, how it compares to traditional signature-based endpoint security, and how Triaxiom fared against it during a recent engagement.  Limitations of traditional endpoint security Every piece of malware has what’s known as a ‘digital signature’ (i.e. a digital footprint) and traditional antivirus (AV) products […]

Lessons from 300
30 Apr 2020

How the Movie ‘300’ Applies to Information Security

This is officially blog number 300! Just to have some fun and learn a few lessons, let’s look at the movie ‘300’ and see if there are any lessons learned we can apply to information security. While this is more of a fun blog than anything else, there a few nuggets we can take away […]

leave passwords in the database
28 Apr 2020

Quick Tip – Leave Passwords in the Database Where They Belong!

Today’s security quick tip is brought to you by some API penetration tests I’ve completed over the past few weeks. One of the things I’ve noticed more and more as organizations are developing and implementing APIs as part of their overall application infrastructure is the presence of “greedy” or overly verbose JSON objects in HTTP […]

two accounts for administrators.
23 Apr 2020

Follow Up Post – Two Accounts for Administrators

Back in September, we wrote a blog on the importance of using two separate accounts for administrators, one user-level and one administrative. If you haven’t read it yet, it does a great job of explaining why it is necessary and why it’s a security best practice. The lower-level user account should have limited permission and […]

security incident lessons learned
21 Apr 2020

Security Incident Lessons Learned Checklist

Today we’re going to put a bow on our series covering different checklists for things you should be thinking about during each of the 5 primary phases of security incident response. We started with the identification phase and how to adequately capture information about a potential security incident to launch an investigation. We then covered […]

CIA Triad
16 Apr 2020

What is the CIA Triad?

Continuing in our key security concept series, this blog will look at the CIA Triad. If you haven’t been following, check out the other blogs in this series on nonrepudiation and dual control. The CIA Triad is one of the most important concepts in information security, as it should drive the actions we take. This […]

TikTok
14 Apr 2020

TikTok Security Implications

Prior to stay at home orders from COVID-19, the 800 million active TikTok users (out of the over 1 billion subscribed users) spent an average of 52 minutes per day on the app. The average user on this social media platform is between the ages of 16-24, and with all these teens stuck at home […]

security incident recovery checklist
9 Apr 2020

Security Incident Recovery Checklist

We are approaching the end of our series of blogs that touch on some important items that your organization should consider for each of the phases of the incident response process, including identification, eradication, and containment. This week we touch on the recovery process following an incident, once everything has been contained and eradicated. This […]

dual control
7 Apr 2020

Key Security Concept: Dual Control

This blog is a continuation of our key security concept blog series. If you have not already, check out our first blog from this series, which discusses nonrepudiation. In today’s blog, we are going to look at another important, but rarely discussed concept, dual control. Simply put, dual control is defined as requiring two or […]

Importance of Quality Assurance to a Penetration Test
2 Apr 2020

The Importance of Quality Assurance to a Penetration Test

Perhaps the most important part of a penetration test, aside from the execution of the test, is the quality assurance or QA of the results and documentation. At the end of the day, the results and the final reports are what you are paying for with a penetration test. Technical Quality Assurance There is nothing […]

«‹ 10 11 12 13›»

Looking for something specific?

Recent Posts

  • hidden-dangers-in-cloudCommon Security Dangers Lurking in Cloud Environments
  • search-bar-6467429_1280Entrinsik Informer Username Enumeration – CVE-2025-65185
  • vCISO header imageThe Case for Using a Cybersecurity Strategic Consultant (vCISO)

Categories

Most Discussed

API Penetration Test AWS Best Practice Checklist Cloud Common Vulnerabilities comparison COMPLIANCE configuration review Core Values Cost Current Events Education External Penetration Test firewall HIPAA improvement Incident Response Internal Penetration Test methodology Passphrase Passwords Password Security PCI PCI DSS PCI QSA penetration test Physical Penetration Test Problems QSA Quick Tips Regulation Remediation Report Risk ROC SAQ Security Awareness Small Business SMB Social Engineering vetting vulnerability Web Application Penetration Test wireless
Back to top
Triaxiom Security
© 2025 Triaxiom Security, a division of Strata Information Group, Inc. All rights reserved.
Privacy Policy