by Terry Crowley | Apr 27, 2021 | InfoSec Strategies
Reading Time: 3 minutes
Your VPN (Virtual Private Network) is intended to protect your online privacy and make life harder for hackers by anonymizing your traffic and location. So think about how devastating might it be for your business if a hacker was...
by Terry Crowley | Jun 24, 2019 | Penetration Testing
Reading Time: 2 minutes
Penetration testing seeks to evaluate your security posture using simulated attacks to identify and exploit vulnerabilities. Most pen testing is done by experts using manual techniques supported by automated tools. In any...
by Mike Gargiullo | Apr 25, 2018 | InfoSec Strategies
Reading Time: 2 minutes
A number of threat researchers are now reporting a massive and sustained spike of almost 500% in the volume of illicit cryptocurrency mining transactions on corporate networks. Trend Micro is hypothesizing that crypto mining...
by Richard Barrus | Mar 1, 2018 | Penetration Testing
Reading Time: 2 minutes
A network penetration test is a deep-dive investigation that returns valuable information when other criteria about your network is already satisfied. Performing a penetration test without good APV management (Asset Management,...
by Terry Crowley | Nov 9, 2017 | InfoSec Strategies
Reading Time: 2 minutes
Yet another massive vulnerability that requires fast and widespread patching has just been announced: the KRACK (Key Reinstallation Attack) vulnerability, which exploits a handshake issue in the WPA2 Wi-Fi protocol. Thanks to KRACK,...