by John Verry | Mar 3, 2022 | Ethical Hacking
Reading Time: 3 minutes
The rapid growth of APIs has led to significant security risks. Unless you have been marooned on an uncharted coral atoll for the last five years, you realize that the term application programming...
by Richard Barrus | Aug 7, 2020 | Network Security, Penetration Testing
Reading Time: 2 minutes
If you’re building a career in a technical cybersecurity role, you know how hard it can be to demonstrate your skills and competence to hiring organizations or their customers. Yes, there are certifications available… but are they...
by John Verry | Jun 9, 2020 | Application Security, Network Security, Penetration Testing
Reading Time: 4 minutes
Anyone with a computer and an Internet connection can set themselves up as a penetration testing or cyber incident response service provider. What methods does your organization have in place for vetting an individual or company...
by Terry Crowley | Nov 13, 2019 | Penetration Testing
Reading Time: 2 minutes
One of the challenges of my job is about once every five weeks or so our marketing director shakes me down for a blog topic. If I don’t have one in mind he tries to brainstorm with me. “What’s going on in your practice that’s new or...
by Terry Crowley | Oct 22, 2019 | Penetration Testing
Reading Time: 2 minutes
As homo-sapiens we are naturally competitive creatures. Although evolutionally this has helped our species in numerous ways, there are a few times where it bites us right in our highly evolved butts… When we perform network...
by Richard Barrus | Sep 6, 2019 | Penetration Testing
Reading Time: 2 minutes
If you’re involved in web application security, you’ve probably heard of the Open Web Application Security Project (OWASP) and its popular Top 10 list of vulnerabilities. But you may not be as familiar with a parallel effort that in...