Triaxiom Security
Partner with us to meet your Information Security needs.
  • About Us
  • Services
    • Penetration Testing
    • Compliance Audit
    • Strategic Consulting
  • Blog
    • Penetration Test
    • PCI Compliance
    • Best Practice
  • Contact Us
Roles and Responsibilities during a Penetration Test
18 Feb 2019

Roles and Responsibilities During a Penetration Test

Today we will review the various roles and responsibilities during a penetration test, from both the client and the Triaxiom vantage points. Every project is different and has its nuances, but for the sake of this article, we will assume that the project is a small external penetration test of 5 IP addresses for ACME, […]

Return on Investment of a Penetration Test
15 Feb 2019

What is the ROI of a Penetration Test?

Unlike the financial analysis of a “normal” project or investment, it is tough to ultimately determine the return on investment of a penetration test. We like to relate a penetration test to your annual physical with your doctor. You go to your doctor to get a check-up as a preventative measure with the hope that […]

Choose a strong password
13 Feb 2019

How to Choose a Strong Password

This may or may not surprise you, but a significant number of people either don’t know how to choose a strong password or decide not to because they don’t think it’s worth the hassle. It’s true! As part of an internal penetration test, after we get domain administrator permissions, we harvest all of the hashed […]

security awareness training
11 Feb 2019

How Much Does Social Engineering Cost?

Social Engineering is one of the most important tests you can have performed because it evaluates the largest risk to your organization. In 2018, 83% of organizations faced a social engineering attack, so it is very likely that this is a threat you are going to continue to see in the new year. Because of […]

go wrong during a social engineering
8 Feb 2019

What Can Go Wrong During a Social Engineering Assessment?

Social engineering attacks hit organizations constantly. In 2018, not only did an average of 83% of organizations see a phishing attempt, there was an increase in credential theft related to phishing attacks of more than 70%. So it’s no surprise that many organizations are trying to figure out how susceptible they are to this kind […]

questions answered by a web application penetration test
6 Feb 2019

The Complete Web Application Penetration Test Guide

Have questions about a web application penetration test? We have you covered in this blog. This is our complete web application penetration test guide which will briefly introduce all of the other blogs we’ve written on the topic and provide a link to more detailed information, should you need it. What is a Web Application […]

mobile application penetration testing methodology
4 Feb 2019

Our Mobile Application Penetration Testing Methodology

This blog outlines Triaxiom Security’s methodology for conducting mobile application penetration tests. A mobile application penetration test emulates an attack specifically targeting a custom mobile application (iOS and/or Android) and aims to enumerate all vulnerabilities within an app, ranging from binary compile issues and improper sensitive data storage to more traditional application-based issues such as […]

api penetration testing methodology
1 Feb 2019

Our API Penetration Testing Methodology

This blog outlines Triaxiom Security’s methodology for conducting Application Programming Interface (API) penetration tests. An API penetration test emulates an external attacker or malicious insider specifically targeting a custom set of API endpoints and attempting to undermine the security in order to impact the confidentiality, integrity, or availability of an organization’s resources. This document outlines […]

Point of a social engineering engagement
30 Jan 2019

What’s the Point of a Social Engineering Engagement?

When we are talking through social engineering with a potential or current client, we notice that many times, the client will respond with some variation of “I already know my users are going to fall for it.” If you already know your users are going to fall for it, what’s the point of a social […]

social engineering methodology
28 Jan 2019

Our Social Engineering Methodology

This blog outlines Triaxiom Security’s social engineering methodology, which is used to guide our engineers during these types of engagements. Social engineering engagements are designed to target and take advantage of the human-element to gain access to your network. During the engagement, a variety of methods are used to get an employee to click on […]

«‹ 26 27 28 29›»

Looking for something specific?

Recent Posts

  • aws s3 sse-c deprecationAWS S3 SSE-C Today, Gone Tomorrow
  • Screenshot 2026-01-16 at 11.13.27 AMAWS CodeBreach: A Close Call For All
  • hidden-dangers-in-cloudCommon Security Dangers Lurking in Cloud Environments

Categories

Most Discussed

API Penetration Test AWS Best Practice Checklist Cloud Cloud Security Cloud Security Assessment Common Vulnerabilities comparison COMPLIANCE configuration review Core Values Cost Current Events Education External Penetration Test firewall HIPAA improvement Incident Response Internal Penetration Test methodology Passphrase Passwords Password Security PCI PCI DSS PCI QSA penetration test Physical Penetration Test Problems QSA Quick Tips Regulation Remediation Report Risk Security Awareness Small Business SMB Social Engineering vetting vulnerability Web Application Penetration Test wireless
Back to top
Triaxiom Security
© 2025 Triaxiom Security, a division of Strata Information Group, Inc. All rights reserved.
Privacy Policy