Triaxiom Security
Partner with us to meet your Information Security needs.
  • About Us
  • Services
    • Penetration Testing
    • Compliance Audit
    • Strategic Consulting
  • Blog
    • Penetration Test
    • PCI Compliance
    • Best Practice
  • Contact Us
Help! I fell for a vishing attack
14 Oct 2019

HELP! I Think I Fell For A Vishing Attack!

After receiving a seemingly innocent call from your “IT department” to help test a new company portal, you worked with the developer on the phone and diligently followed his prompts as quickly as possible so you could get back to work on this memo your boss wanted. A few hours later, it dawns on you. […]

what is owasp
10 Oct 2019

What is OWASP?

Such a simple question, but it has many different answers, all of which can be important to your understanding of web application security. The Open Web Application Security Project (OWASP) is a non-profit organization with a simple mission: Improving the Security of Software. The organization is open to anyone, receiving contributions from security professionals and […]

silver bullet
8 Oct 2019

There is No Silver Bullet in Security

In folklore, the silver bullet is the only thing that can effectively kill a werewolf. Sure, you can trap a werewolf and hide til daylight or concoct some other workaround, but if you are lucky enough to have a silver bullet that is the one-stop shop. You can kill the werewolf and not have to […]

What is the DHS Cyber Hunt and Incident Response Teams Act?
4 Oct 2019

What is the DHS Cyber Hunt and Incident Response Teams Act?

On September 24th, 2019, Senate Bill S.315 aka the “DHS Cyber Hunt and Incident Response Teams Act of 2019” was passed unanimously. The legislation seeks to amend the Homeland Security Act of 2002, authorizing DHS’ National Cybersecurity and Communications Integration Center (NCCIC) to permanently operate cyber hunt and incident response teams that can aid federal […]

Cyber Security Awareness Month
2 Oct 2019

Cyber Security Awareness Month – 2019

In the spirit of kicking off Cyber Security Awareness Month, today we take a look back at useful tricks and tips to help improve your organization’s cyber security awareness. Remember, you are only as secure as your weakest link, which tends to be the people working in your organization. Password Management As you might expect, […]

data flow diagrams
30 Sep 2019

Why Data Flow Diagrams and Data Storage Inventories Are Important

For any organization, the first step in protecting your assets is understanding what you have. While most companies are pretty good at inventorying their physical assets (e.g. computers, devices, monitors), they are overlooking another critical asset they should be considering: their data. Understanding how what sensitive data flows throughout your network, who has access to […]

What is the Visa MSSIP
27 Sep 2019

What is the Visa Merchant Servicer Self-Identification Program (MSSIP)?

What is the Visa Merchant Servicer Self-Identification Program (MSSIP) and how can I get my company included on the list? This is a great question and today we will explore what this is, the benefits for your company, and how you can get on the list. What is the Visa MSSIP? The Visa MSSIP was […]

difference between an SAQ and a RoC
25 Sep 2019

What’s the Difference Between an SAQ and a RoC?

In today’s blog, we are going to focus on PCI compliance. If you are being asked to show that you are handling credit card information appropriately and are compliant with the PCI Data Security Standard (DSS), there are two ways this can be done, a Self Assessment Questionnaire (SAQ) or a Report on Compliance (RoC). […]

tools for osint
23 Sep 2019

Tools For OSINT – The Top Four

We discussed last week that open source intelligence, or OSINT, is one of the most important phases of an assessment for a penetration tester. It is this part of a test where an engineer is gathering background information about an organization that is publicly available, ranging from the business they are in, to the types […]

Two Accounts For Administrator
20 Sep 2019

Using Two Accounts for Administrators

There is no question that administrators need an account with elevated permissions so they can effectively manage and care for the domain and users. For this blog, let’s call that account the “Superman” account. However, security best practice is increasingly calling for administrators to have a second account that they use to perform their daily […]

«‹ 16 17 18 19›»

Looking for something specific?

Recent Posts

  • web application penetration testingWeb Application Penetration Testing – A Beginner’s Guide
  • external penetration testWhat is an External Penetration Test?
  • why should you prepare for a penetration testWhy Should You Prepare for a Penetration Test?

Categories

Most Discussed

API Penetration Test Best Practice Checklist Cloud Common Vulnerabilities comparison COMPLIANCE configuration review Core Values Cost Current Events Education External Penetration Test firewall HIPAA improvement Incident Response Internal Penetration Test methodology Onsite Assessment Passphrase Passwords Password Security PCI PCI DSS PCI QSA penetration test Physical Penetration Test Problems QSA Quick Tips Regulation Remediation Report Risk ROC SAQ Security Awareness Small Business SMB Social Engineering vetting vulnerability Web Application Penetration Test wireless
Back to top
Triaxiom Security
© 2025 Triaxiom Security, a division of Strata Information Group, Inc. All rights reserved.
Privacy Policy