Check out our webinar from Christian Hyatt and Shane Peden where they discuss roadmaps and business cases for security, privacy, and compliance for healthcare technology companies.
Understanding the results of a HITRUST engagement and how to use them.
During your vendor due diligence process, a vendor sends you their HITRUST report. What exactly does […]
How to progress toward a truly secure organization and infrastructure after penetration testing.
You did it – you paid for penetration testing services.
Whether it was to fulfill a potential client’s request, […]
And how they are still relevant today.
On a warm, sunny day in July 2017, one of the world’s most catastrophic and rampant demonstrations of ransomware began. Commonly referred to as […]
Global research and advisory firm, Gartner, forecasts that information security spending will exceed $124 billion in 2019, yet cyber defenses continue to fail. Organizations large and small continue to experience […]
Why the Internet of Things is a penetration tester’s most valuable asset.
As technology moves at a seemingly exponential rate of growth and changes every day, more and more devices are […]
ISO 27001: Understanding Security Roles and Responsibilities and Why They Are Vital to the Success of Your Security Program
When building your Information Security Management System (ISMS) as part of ISO 27001 program implementation one of the most important elements of the system of management for your security program […]
Capital One’s recent data breach is only the latest in the perennial series of high-profile data breaches that have occurred in the last few years. What do Equifax, Home Depot, […]
From a penetration tester’s perspective, there are a few things that quickly indicate an organization’s maturity (and the likelihood our team will be able to exploit their environment). If any […]