Triaxiom Security
Partner with us to meet your Information Security needs.
  • About Us
  • Services
    • Penetration Testing
    • Compliance Audit
    • Strategic Consulting
  • Blog
    • Penetration Test
    • PCI Compliance
    • Best Practice
  • Contact Us
External Penetration Test
28 Aug 2025

Everything You Need to Know About an External Penetration Test

External penetration tests are one of the most common tests we perform. An external penetration test is often the starting point for any company that is trying to understand its risk. With numerous compliance regulations (PCI, GDPR, HIPAA, CMMC, etc) either requiring external penetration tests or “highly recommending” them, we get to perform a lot […]

Attack Surface
28 Aug 2025

Quick Tips – How to Limit Your Attack Surface

A common theme for many of the External Penetration Tests that we perform is unnecessary attack surface exposed to the Internet. So what is your Internet attack surface? How do you reduce it? And why is this even important? These are all great questions and items worthy of a blog post, given how often we […]

aws security assessment is cloud security
28 Jul 2025

AWS Security Assessment: What to Expect

AWS Security Assessment is equal parts art and science. Are you considering an AWS security assessment? Learn exactly what to expect from a professional AWS security assessment: from discovery to deliverables, executive reporting and recommendations for remediation. The need for strong, proactive security has never been greater. Whether you’re preparing for a compliance audit, building […]

common security gaps in aws
22 Jul 2025

Common Security Gaps in AWS: How to Lock Down AWS

Is your cloud secure? Discover the most common AWS security gaps we uncover during audits, including public resources, IAM misconfigurations, and more. AWS offers IT teams the ability to create new technology solutions quickly and easily. But with great power comes great responsibility, and unfortunately, security misconfigurations in AWS are far too common. We perform […]

oracle cloud security checklist
16 Jul 2025

Oracle Cloud Security Checklist

If your organization runs critical workloads in Oracle Cloud Infrastructure (OCI), you know security compliance is non-negotiable. This Oracle Cloud Security Checklist can help you get ready for your next audit. Whether you’re preparing for a formal audit, aligning with compliance requirements, or just taking control of your cloud security posture, a proactive OCI security […]

External vs. Internal
9 Jul 2025

External vs Internal Penetration Testing – How to Choose With a Limited Budget

When planning a penetration test, one of the most common questions organizations face is whether to choose between external vs internal penetration testing. This post will help you understand the key differences between the two approaches and how to choose the one that provides the most value to your organization. While the obvious answer might […]

after-hours penetration testing
8 Jul 2025

Does External Penetration Testing Need to Be Conducted “After-Hours”?

A question we often receive when scoping an engagement is, “Can my external penetration test be conducted after hours?” The short answer is yes, but there are some trade-offs that not everyone is aware of. In some cases, it could mean paying more for something you may not actually need. We’re always happy to talk […]

hacking-3112539_1280
7 Jul 2025

DNS Zone Transfers: A Classic Risk Still Overlooked

What are DNS Zone Transfers? While DNS zone transfers may seem like a relic of the past, they remain a relevant and potentially serious vulnerability in today’s cybersecurity landscape. Although many organizations addressed this issue decades ago, misconfigurations still occur, often due to legacy systems or oversight. As headlines have repeatedly shown, even widely known […]

incident-response-tabletop-exercises
2 Jul 2025

Incident Response Tabletop Exercises: Beyond the Checkbox

Many organizations either skip incident response tabletop exercises entirely or settle for off-the-shelf scenarios that lack relevance to their environment. As a result, these exercises become little more than a “check-the-box” activity—minimally valuable and often poorly attended. To truly strengthen incident response and organizational resilience, tabletop exercises must be designed with purpose, realism, and customization. Why Traditional Incident […]

external penetration testing methodology
2 Jul 2025

Our External Penetration Testing Methodology

One of the most common and important questions we get from prospective customers is about our external penetration testing methodology. It’s a sign they’re doing their homework, which makes sense: if you’re going to let someone try to break into your network, you should know exactly how they plan to do it. We also love […]

‹ 1 2 3 4›»

Looking for something specific?

Recent Posts

  • aws s3 sse-c deprecationAWS S3 SSE-C Today, Gone Tomorrow
  • Screenshot 2026-01-16 at 11.13.27 AMAWS CodeBreach: A Close Call For All
  • hidden-dangers-in-cloudCommon Security Dangers Lurking in Cloud Environments

Categories

Most Discussed

API Penetration Test AWS Best Practice Checklist Cloud Cloud Security Cloud Security Assessment Common Vulnerabilities comparison COMPLIANCE configuration review Core Values Cost Current Events Education External Penetration Test firewall HIPAA improvement Incident Response Internal Penetration Test methodology Passphrase Passwords Password Security PCI PCI DSS PCI QSA penetration test Physical Penetration Test Problems QSA Quick Tips Regulation Remediation Report Risk Security Awareness Small Business SMB Social Engineering vetting vulnerability Web Application Penetration Test wireless
Back to top
Triaxiom Security
© 2025 Triaxiom Security, a division of Strata Information Group, Inc. All rights reserved.
Privacy Policy