Triaxiom Security
Partner with us to meet your Information Security needs.
  • About Us
  • Services
    • Penetration Testing
    • Compliance Audit
    • Strategic Consulting
  • Blog
    • Penetration Test
    • PCI Compliance
    • Best Practice
  • Contact Us
internal penetration testing methodology
14 Jun 2018

Our Internal Penetration Testing Methodology

Internal penetration testing takes the perspective of a malicious individual that is connected to your organization’s corporate network. This style of penetration testing has a similar goal to external penetration testing (find sensitive data, take administrative control of the network, etc.), but provides a completely different attack surface for the assessment team to analyze. This […]

pci internal penetration test
12 Jun 2018

What is a PCI Internal Penetration Test?

Internal penetration testing is a specific flavor of penetration testing that takes place from within your organization’s network. This testing is specifically designed to emulate a malicious insider or an external attacker that gains a foothold on the network. While the concept is pretty straightforward, there are some interesting nuances when you talk about internal […]

cheapest quote penetration test
31 May 2018

Should You Go With the Cheapest Quote for a Penetration Test?

Unfortunately the age old adage “you get what you pay for” has never been more true than in the penetration testing industry. We often hear from potential clients that are seeking a new penetration testing partner because they had previously gone with the cheapest quote and are now “paying the price” (pun intended). A response we […]

segmentation validation
29 May 2018

How Do I Verify That a Company is PCI Compliant?

A lot of companies, from small businesses to Fortune 500s, have to deal with the Payment Card Industry Data Security Standard (PCI DSS). Depending on your size and business processes, a lot of your work with PCI could simply be verifying that third-party service providers maintain PCI compliance. But we’ve seen that even something so […]

Improve your Pentest Results
24 May 2018

Top 5 Ways to Improve the Results of Your Penetration Test

We often get asked what is the easiest way to prepare in order to improve the results of your penetration test. Whether it be to ensure your regulatory compliance, provide a clean penetration test report to a potential customer, or just to better your overall security posture, having a penetration test with fewer critical findings […]

boost pci compliance
22 May 2018

Top 5 Ways to Boost PCI Compliance

Compliance with the Payment Card Industry Data Security Standard (PCI DSS) can be a daunting task for many organizations. Understanding what’s expected of you can be hard enough, but then deciding on a strategic path forward to reaching a state of compliance and maintaining that posture can be incredibly complex. If you don’t do it right, […]

re-test
17 May 2018

Is a Re-Test Included with a Penetration Test?

One of the key differences we’ve seen between penetration testing quotes is the inclusion of a re-test. A re-test of discovered findings is one of those things in the security consulting industry that seems to have become a topic of fierce debate, as many organizations are trying to leverage it as a differentiator. Getting discovered […]

Partnering With You
14 May 2018

What Do We Mean When We Say “Partnering With You”?

The phrase “partnering with you” is such a simple phrase, but it can have many different meanings. We do not view a partnership as providing someone with an 800 number or a line that goes to a corporate tree. We do not believe a partnership has an expiration date that corresponds with the last day […]

what certifications should penetration testers have
10 May 2018

What Certifications Should Penetration Testers Have?

It can often be hard to know what makes someone qualified to perform penetration testing. There’s no such thing as a “licensed penetration tester” in the terms of an international, federal, or state approval, like a lawyer or medical professional. And if you’re not in the security industry, it can extremely difficult to decipher “acronym […]

risk of third party vendors may be the weak link
8 May 2018

How Do I Evaluate the Risk of Third Party Vendors?

Most have heard about the 2013 Target Data Breach. You know, the one that exposed the payment card data of over 40 million customers, resulted in the CEO resigning, and cost Target $252 million. Well did you know that the initial data breach leveraged credentials stolen from there Heating and Air Conditioning vendor? Of course there […]

«‹ 34 35 36 37›

Looking for something specific?

Recent Posts

  • top 10 strategic questions for cloud securityTop 10 Strategic Questions in Cloud Security
  • cloud security assessment complianceThe Critical Need for Comprehensive Cloud Security Risk Assessments
  • web application penetration testingWeb Application Penetration Testing – A Beginner’s Guide

Categories

Most Discussed

API Penetration Test AWS Best Practice Checklist Cloud Common Vulnerabilities comparison COMPLIANCE configuration review Core Values Cost Current Events Education External Penetration Test firewall HIPAA improvement Incident Response Internal Penetration Test methodology Passphrase Passwords Password Security PCI PCI DSS PCI QSA penetration test Physical Penetration Test Problems QSA Quick Tips Regulation Remediation Report Risk ROC SAQ Security Awareness Small Business SMB Social Engineering vetting vulnerability Web Application Penetration Test wireless
Back to top
Triaxiom Security
© 2025 Triaxiom Security, a division of Strata Information Group, Inc. All rights reserved.
Privacy Policy