Triaxiom Security
Partner with us to meet your Information Security needs.
  • About Us
  • Services
    • Penetration Testing
    • Compliance Audit
    • Strategic Consulting
  • Blog
    • Penetration Test
    • PCI Compliance
    • Best Practice
  • Contact Us
What is the DHS Cyber Hunt and Incident Response Teams Act?
4 Oct 2019

What is the DHS Cyber Hunt and Incident Response Teams Act?

On September 24th, 2019, Senate Bill S.315 aka the “DHS Cyber Hunt and Incident Response Teams Act of 2019” was passed unanimously. The legislation seeks to amend the Homeland Security Act of 2002, authorizing DHS’ National Cybersecurity and Communications Integration Center (NCCIC) to permanently operate cyber hunt and incident response teams that can aid federal […]

Cyber Security Awareness Month
2 Oct 2019

Cyber Security Awareness Month – 2019

In the spirit of kicking off Cyber Security Awareness Month, today we take a look back at useful tricks and tips to help improve your organization’s cyber security awareness. Remember, you are only as secure as your weakest link, which tends to be the people working in your organization. Password Management As you might expect, […]

data flow diagrams
30 Sep 2019

Why Data Flow Diagrams and Data Storage Inventories Are Important

For any organization, the first step in protecting your assets is understanding what you have. While most companies are pretty good at inventorying their physical assets (e.g. computers, devices, monitors), they are overlooking another critical asset they should be considering: their data. Understanding how what sensitive data flows throughout your network, who has access to […]

What is the Visa MSSIP
27 Sep 2019

What is the Visa Merchant Servicer Self-Identification Program (MSSIP)?

What is the Visa Merchant Servicer Self-Identification Program (MSSIP) and how can I get my company included on the list? This is a great question and today we will explore what this is, the benefits for your company, and how you can get on the list. What is the Visa MSSIP? The Visa MSSIP was […]

difference between an SAQ and a RoC
25 Sep 2019

What’s the Difference Between an SAQ and a RoC?

In today’s blog, we are going to focus on PCI compliance. If you are being asked to show that you are handling credit card information appropriately and are compliant with the PCI Data Security Standard (DSS), there are two ways this can be done, a Self Assessment Questionnaire (SAQ) or a Report on Compliance (RoC). […]

tools for osint
23 Sep 2019

Tools For OSINT – The Top Four

We discussed last week that open source intelligence, or OSINT, is one of the most important phases of an assessment for a penetration tester. It is this part of a test where an engineer is gathering background information about an organization that is publicly available, ranging from the business they are in, to the types […]

Two Accounts For Administrator
20 Sep 2019

Using Two Accounts for Administrators

There is no question that administrators need an account with elevated permissions so they can effectively manage and care for the domain and users. For this blog, let’s call that account the “Superman” account. However, security best practice is increasingly calling for administrators to have a second account that they use to perform their daily […]

What is the Ohio Data Protection Act
18 Sep 2019

What Is The Ohio Data Protection Act?

On August 3, 2018, Governor John Kasich signed Senate Bill 220, also known as the “Ohio Data Protection Act“. Unfortunately, this caused some confusion for businesses operating in Ohio, so today, we will discuss the act and how it may apply to you. This act IS NOT meant to lay forth a minimum security requirement for businesses in Ohio. In fact, […]

osint
16 Sep 2019

What is OSINT?

Conducting OSINT, or open source intelligence, operations refers to the act of gaining information about a target through “open sources.” This is data that is freely available on the Internet through things like search engines. Open source reconnaissance is a key part of any good penetration test, as it can provide useful information that is […]

balancing usability vs. security
13 Sep 2019

Usability vs. Security: The Age-Old Battle

One of the age-old battles in information security is balancing the trade-offs between usability vs. security. We recently had a conversation with a client where this was brought up as a concern for implementing security controls we were recommending. The client said, “sure I can lock down this website such that no IP can get […]

«‹ 17 18 19 20›»

Looking for something specific?

Recent Posts

  • aws s3 sse-c deprecationAWS S3 SSE-C Today, Gone Tomorrow
  • Screenshot 2026-01-16 at 11.13.27 AMAWS CodeBreach: A Close Call For All
  • hidden-dangers-in-cloudCommon Security Dangers Lurking in Cloud Environments

Categories

Most Discussed

API Penetration Test AWS Best Practice Checklist Cloud Cloud Security Cloud Security Assessment Common Vulnerabilities comparison COMPLIANCE configuration review Core Values Cost Current Events Education External Penetration Test firewall HIPAA improvement Incident Response Internal Penetration Test methodology Passphrase Passwords Password Security PCI PCI DSS PCI QSA penetration test Physical Penetration Test Problems QSA Quick Tips Regulation Remediation Report Risk Security Awareness Small Business SMB Social Engineering vetting vulnerability Web Application Penetration Test wireless
Back to top
Triaxiom Security
© 2025 Triaxiom Security, a division of Strata Information Group, Inc. All rights reserved.
Privacy Policy