by Michael Gargiullo | May 16, 2017 | Ethical Hacking
Reading Time: 2 minutes
One would think that most CISOs and IT security teams are at least cautiously optimistic about their ability to respond to cyber threats. But if the opinions of professional “white hat” hackers are any indication, the reality is that...
by Michael Gargiullo | Oct 18, 2016 | Ethical Hacking, Penetration Testing
Reading Time: 2 minutes
Define: Internet of Things (IoT) The internet of things (IoT) is the internetworking of physical devices, vehicles, buildings, and other items; embedded with electronics, software, sensors, actuators, and network connectivity that...
by Bhaumik Shah | Jun 21, 2016 | Ethical Hacking, Penetration Testing
Reading Time: 3 minutes
In Part 1 of this post, I provided an overview of mobile app attack vectors and penetration testing approaches. In Part 2, I covered tools, techniques and issues related to the two types of mobile applications: browser-based and...
by Mike Gargiullo | Jun 14, 2016 | Ethical Hacking, Penetration Testing
Reading Time: 3 minutes
About 2 weeks ago I had an in-depth conversation with a client after performing a low-intensity penetration test. We offer a low-cost penetration test option that we call a “Validate” level engagement. Basically, a Validate level...
by Bhaumik Shah | Jun 1, 2016 | Ethical Hacking, Penetration Testing
Reading Time: 5 minutes
In Part 1 of this post, I provided an overview of mobile app attack vectors and penetration testing approaches. In Part 2, I covered tools, techniques, and issues related to the two types of mobile applications: browser-based and...
by Scott | Apr 9, 2012 | Ethical Hacking, Penetration Testing
Reading Time: 2 minutes
These ISO 27001 links are part of a weekly series, Ethical Hacker Roundup, featuring the information security and cyber security related articles that we’ve read over and thought worth sharing from the past week. These articles...