by Richard Barrus | Oct 8, 2020 | Network Security
Reading Time: 2 minutes
If you’re a technical cybersecurity practitioner, there are a number of certification courses out there to give you some credentials. But how well respected is a given course? How do various courses compare? What program is...
by Richard Barrus | Aug 7, 2020 | Network Security, Penetration Testing
Reading Time: 2 minutes
If you’re building a career in a technical cybersecurity role, you know how hard it can be to demonstrate your skills and competence to hiring organizations or their customers. Yes, there are certifications available… but are they...
by Richard Barrus | Aug 6, 2020 | Network Security
Reading Time: 3 minutes
How is buying penetration testing services like getting a colonoscopy? In either case, because of the technical specialization involved, you have no clue whether the practitioner actually did what they were supposed to do. You just...
by John Verry | Jun 9, 2020 | Application Security, Network Security, Penetration Testing
Reading Time: 4 minutes
Anyone with a computer and an Internet connection can set themselves up as a penetration testing or cyber incident response service provider. What methods does your organization have in place for vetting an individual or company...
by Taylor Smith | Jun 5, 2020 | Cloud Security
Reading Time: 3 minutes
In recent years, businesses have found ways to cover their technology needs without internal systems and staff. On-site IT staff, hardware, and internally developed and maintained software are becoming less commonplace, and we are...