by Jeremy Sporn | Aug 7, 2020 | Network Security, Penetration Testing
Reading Time: 2 minutes
If you’re building a career in a technical cybersecurity role, you know how hard it can be to demonstrate your skills and competence to hiring organizations or their customers. Yes, there are certifications available… but are they...
by John Verry | Jun 9, 2020 | Application Security, Network Security, Penetration Testing
Reading Time: 4 minutes
Anyone with a computer and an Internet connection can set themselves up as a penetration testing or cyber incident response service provider. What methods does your organization have in place for vetting an individual or company...
by Terry Crowley | Nov 13, 2019 | Penetration Testing
Reading Time: 2 minutes
One of the challenges of my job is about once every five weeks or so our marketing director shakes me down for a blog topic. If I don’t have one in mind he tries to brainstorm with me. “What’s going on in your practice that’s new or...
by Terry Crowley | Oct 22, 2019 | Penetration Testing
Reading Time: 2 minutes
As homo-sapiens we are naturally competitive creatures. Although evolutionally this has helped our species in numerous ways, there are a few times where it bites us right in our highly evolved butts… When we perform network...
by Jeremy Sporn | Sep 6, 2019 | Penetration Testing
Reading Time: 2 minutes
If you’re involved in web application security, you’ve probably heard of the Open Web Application Security Project (OWASP) and its popular Top 10 list of vulnerabilities. But you may not be as familiar with a parallel effort that in...
by Terry Crowley | Jul 3, 2019 | Penetration Testing
Reading Time: 3 minutes
Just because you moved your virtual servers, databases and/or applications to the public cloud doesn’t mean they are somehow now magically secure. You still need penetration testing to verify your cloud environment is secure and to...