by Terry Crowley | Jun 14, 2018 | InfoSec Strategies
Reading Time: 2 minutes
Speaking at the recent CyberUK conference in Manchester, Dave Hogue, senior technical director of the Cybersecurity Threat Operations Center at the NSA, flatly stated: We have sophisticated adversaries using unsophisticated means to...
by Terry Crowley | Apr 17, 2018 | Penetration Testing
Reading Time: 3 minutes
Even if your company has a robust firewall, an intrusion detection system (IDS) and antivirus/anti-malware, hackers can still gain access to your systems and data by exploiting vulnerabilities in your networks. Finding those...
by Richard Barrus | Mar 1, 2018 | Penetration Testing
Reading Time: 2 minutes
A network penetration test is a deep-dive investigation that returns valuable information when other criteria about your network is already satisfied. Performing a penetration test without good APV management (Asset Management,...
by Richard Barrus | Nov 15, 2017 | Penetration Testing
Reading Time: 3 minutes
There are basically three levels of network penetration testing, plus a complementary “fourth level” of network security architecture review: 1) Security Assessment (Validation) This level of testing is...
by Richard Barrus | Aug 11, 2016 | ISMS Consulting
Reading Time: 2 minutes
It’s commonplace for the vulnerability scans I run at client sites to turn up servers running unsupported software like Windows Server 2003, SQL Server 2005 or Cisco’s IOS 15. Our scans flag this as a critical issue. Often the client...