by Mike Gargiullo | Dec 9, 2021 | Network Security
Reading Time: 3 minutes
Twitter and various InfoSec outlets just blew up over a CVE (Common Vulnerabilities and Exposures) database entry CVE-2021-38759 published on December 7, 2021, noting that Raspberry Pi OS utilized a default password...
by Terry Crowley | Nov 13, 2019 | Penetration Testing
Reading Time: 2 minutes
One of the challenges of my job is about once every five weeks or so our marketing director shakes me down for a blog topic. If I don’t have one in mind he tries to brainstorm with me. “What’s going on in your practice that’s new or...
by Taylor Smith | Oct 17, 2019 | Network Security
Reading Time: 3 minutes
With Halloween just around the corner, it’s the time of year for horrors and haunts of all flavors. For kids, it’s all fun and games and reruns of old cheesy terror flicks and slasher films. But for your business, other kinds of...
by Terry Crowley | Jun 24, 2019 | Penetration Testing
Reading Time: 2 minutes
Penetration testing seeks to evaluate your security posture using simulated attacks to identify and exploit vulnerabilities. Most pen testing is done by experts using manual techniques supported by automated tools. In any...
by John Verry | May 11, 2018 | Penetration Testing
Reading Time: 3 minutes
Editor’s Note: This post was originally published in June 2013 and has been updated for accuracy and comprehensiveness. NIST/FISMA guidance is generally more prescriptive than most other forms of information security guidance....