by Terry Crowley | Jun 24, 2019 | Penetration Testing
Reading Time: 2 minutes
Penetration testing seeks to evaluate your security posture using simulated attacks to identify and exploit vulnerabilities. Most pen testing is done by experts using manual techniques supported by automated tools. In any...
by Terry Crowley | Apr 16, 2019 | InfoSec Strategies
Reading Time: 2 minutes
There’s a new trend in cybercrime: why go to the trouble of hacking systems when you can exploit compromised login/password credentials to just log right in? Passwords Aren’t “Safe” Research from Verizon and others...
by Terry Crowley | Apr 2, 2019 | InfoSec Strategies
Reading Time: 2 minutes
It’s hard to remember a bunch of different passwords, which is why people habitually reuse them—despite the obvious security risks. A recent survey by the password manager vendor LastPass revealed that, while 91% of respondents knew...
by Terry Crowley | Nov 27, 2018 | ISMS Consulting
Reading Time: 2 minutes
A recent report from tCell that analyzed more than 316 million security incidents shares key data on the most common real-world attacks targeting in-production web applications. One statistic that caught my eye is that it took an...
by Terry Crowley | Oct 16, 2018 | ISMS Consulting
Reading Time: 2 minutes
It looks like Windows 10 has finally overtaken Windows 7 as the most widely-deployed Windows platform. From a cybersecurity standpoint, this is good news. Windows 10 is a more secure environment with more up-to-date security...