The Perfect Storm
· A tale about a network engineer who makes a critical mistake that leaves his company exposed. The following is a true story. The details have been slightly modified to protect the companies and people involved. Hello, my name is Max. I was working in Atlanta with a company named “We Secure”. It was a […]
On-demand Pentesting
· Attack Surface Management with Penetration Testing Traditionally, industry practice was to perform manual penetration testing on a semi-annual basis. The problem with this approach is that vulnerabilities are often introduced right after a test has completed and critical issues could be overlooked until the next testing window. While automated vulnerability scanning tools mitigate some of this […]
The Role of Executive Leadership in Cybersecurity
· Cybersecurity is an incredibly complex topic. Even the most brilliant minds will not understand a lot of it unless they spend of time learning about the topic. Executives do not have that luxury and must depend on their mid to lower-level managers. Yet those managers are often not in a place of power to […]
Penetration Testing as a Service
· Pentesting as a service is quickly becoming a more advantageous way of securing a company’s internet presence. While the degree of protection needed for each business differs, one thing is clear. We are not doing enough. IT Leadership is beginning to realize that one Pentest a year is not enough. What happens if an […]
Steps to take, in order of priority, if your personal residence is hacked…
· Steps to take, in order of priority,if your personal residence is hacked… This new age of internet based socialcommunities presents an entire new frontier for cyber criminals. New cyber-attack methods are being inventedevery day. If you believe that one of your corepersonal accounts have been hacked, time is of the essence! Time of […]