The Perfect Storm

· A tale about a network engineer who makes a critical mistake that leaves his company exposed. The following is a true story.  The details have been slightly modified to protect the companies and people involved. Hello, my name is Max.  I was working in Atlanta with a company named “We Secure”.  It was a […]

On-demand Pentesting

· Attack Surface Management with Penetration Testing Traditionally, industry practice was to perform manual penetration testing on a semi-annual basis.  The problem with this approach is that vulnerabilities are often introduced right after a test has completed and critical issues could be overlooked until the next testing window. While automated vulnerability scanning tools mitigate some of this […]

The Role of Executive Leadership in Cybersecurity

· Cybersecurity is an incredibly complex topic.  Even the most brilliant minds will not understand a lot of it unless they spend of time learning about the topic.  Executives do not have that luxury and must depend on their mid to lower-level managers.  Yet those managers are often not in a place of power to […]

Penetration Testing as a Service

· Pentesting as a service is quickly becoming a more advantageous way of securing a company’s internet presence. While the degree of protection needed for each business differs, one thing is clear. We are not doing enough. IT Leadership is beginning to realize that one Pentest a year is not enough.  What happens if an […]

Steps to take, in order of priority, if your personal residence is hacked…

·   Steps to take, in order of priority,if your personal residence is hacked… This new age of internet based socialcommunities presents an entire new frontier for cyber criminals.  New cyber-attack methods are being inventedevery day. If you believe that one of your corepersonal accounts have been hacked, time is of the essence!  Time of […]