Blog & Articles

Web Application Security

Web Application Security

Protecting Web Apps Protects the Company and Customers Web application security refers to the measures and practices taken to protect web applications from unauthorized access, data breaches, and other malicious activities. It involves implementing relevant...

read more
Network Security: Searching for the Gaps

Network Security: Searching for the Gaps

Business Uptime Customers rely on businesses to store and share sensitive information such as customer data, financial records, and proprietary information. A data breach can disrupt business operations, causing significant financial losses. Many industries are...

read more
Where security compliance meets proactive management

Where security compliance meets proactive management

Compliance is a critical aspect of security management and staying compliant can seem daunting. According to IBM's 2022 Cost of a Data Breach Report compliance failures reached an average cost of USD 5.57 million. While compliance is not an all-encompassing approach...

read more
The Value of Vulnerability Assessments

The Value of Vulnerability Assessments

Vulnerability Assessments and Penetration Tests It’s well known that a vulnerability assessment is not a penetration test. This is often said to point to the superiority of a penetration test (pentest). Pentests are definitely superior in that they recreate what a...

read more
Penetration Testing Frameworks

Penetration Testing Frameworks

Penetration testing involves numerous tasks involving different stages. Frameworks provide penetration testers a structure to follow, keeping the details and activities from becoming chaos.

read more
Penetration Testing and MSPs

Penetration Testing and MSPs

(source: pablo.buffer.com) Managed Service Providers MSPs provide invaluable services to companies with minimal or no IT staff. When prospects sign on as customers, they're expecting the experts to be ready at a moment's notice to fix any issues based on their...

read more
SIM-Swap Fraud

SIM-Swap Fraud

Figure 1 - photo from pixabay.com SIM-swap fraud is an increasingly widespread means for hackers to steal access to your phone number and then your identity. We will explain how SIM-swapping works and how you can keep yourself safe. A “SIM-swap” means that a hacker...

read more
T-Mobile Breach

T-Mobile Breach

You want to secure your T-Mobile account if you have one by changing your password and added in a passcode (or changing that too if you have one). Log into your T-Mobile account before a hacker can and change the password to something unique.

read more
The D.A.E.R. Penetration Testing Methodology

The D.A.E.R. Penetration Testing Methodology

"... cloud assets deserve a seat at the grown-up security table and a piece of your budget pie." According to Verizon's 2021 DBIR, web applications are such a common target that they deserve as much attention, if not more, than on-prem assets. And the continued high...

read more
Cyber Security Threats in Energy Sector

Cyber Security Threats in Energy Sector

Introduction Energy infrastructures are complex systems with physical, topographical, and digital interdependencies with other critical infrastructures, such as transport, media communications, water, horticulture, finance, and networks. These support public...

read more
PYSA (Mesiponza) Ransomware:  A Brief Analysis

PYSA (Mesiponza) Ransomware: A Brief Analysis

Source: Ransomware Graphic by Charlie Coombs The State of Ransomware The trend of Ransomware attacks continues to grow, inflicting damages to almost every business around the globe. According to research, a company is attacked by a cybercriminal every 11 seconds, and...

read more