13 Nov Penetration Testing When It Comes to Patching Vulnerabilities, “Missing Some Spots” Isn’t Good Enough January 19, 2024 By Terry Crowley One of the challenges of my job is about once every five weeks or so our marketing director shakes me down for a blog topic. If I don’t... Continue reading
22 Oct Penetration Testing “Keeping Up with the Joneses” Should Not Be Your Network Security Strategy January 13, 2024 By Terry Crowley As homo-sapiens we are naturally competitive creatures. Although evolutionally this has helped our species in numerous ways, there are ... Continue reading
17 Oct Network Security The Zero-Day Monster: One More Reason I’m Really Excited for Halloween January 15, 2024 By Taylor Smith With Halloween just around the corner, it’s the time of year for horrors and haunts of all flavors. For kids, it’s all fun and games an... Continue reading
12 Feb InfoSec Strategies | Category - Pivot Point Security How to Securely Implement Cross-Origin Resource Sharing (CORS) July 15, 2024 By Richard Barrus In recent web application assessments, I’ve found a number of client applications that have cross-origin resource sharing (CORS) vulne... Continue reading
24 Apr Cybersecurity | Category - Pivot Point Security, ISMS Consulting Pros and Cons of Cyber Security Self-Audits September 12, 2024 By Richard Barrus The self-audit is the most basic form of cyber security audit. While it is no substitute for the impartiality and expertise of a profes... Continue reading