by Terry Crowley | Nov 13, 2019 | Penetration Testing
Reading Time: 2 minutes
One of the challenges of my job is about once every five weeks or so our marketing director shakes me down for a blog topic. If I don’t have one in mind he tries to brainstorm with me. “What’s going on in your practice that’s new or...
by Terry Crowley | Oct 22, 2019 | Penetration Testing
Reading Time: 2 minutes
As homo-sapiens we are naturally competitive creatures. Although evolutionally this has helped our species in numerous ways, there are a few times where it bites us right in our highly evolved butts… When we perform network...
by Taylor Smith | Oct 17, 2019 | Network Security
Reading Time: 3 minutes
With Halloween just around the corner, it’s the time of year for horrors and haunts of all flavors. For kids, it’s all fun and games and reruns of old cheesy terror flicks and slasher films. But for your business, other kinds of...
by Richard Barrus | Feb 12, 2019 | InfoSec Strategies
Reading Time: 5 minutes
In recent web application assessments, I’ve found a number of client applications that have cross-origin resource sharing (CORS) vulnerabilities—which I flagged as Critical because they left the application wide open to a range of...
by Richard Barrus | Apr 24, 2018 | ISMS Consulting
Reading Time: 2 minutes
The self-audit is the most basic form of cyber security audit. While it is no substitute for the impartiality and expertise of a professional auditor, a self-audit can add considerable value, particularly if you’ve never done any...