So, you got a pentest. Now what?
How to progress toward a truly secure organization and infrastructure after penetration testing. You did it – you paid for penetration testing services. Whether it was to fulfill a potential [...]
How to progress toward a truly secure organization and infrastructure after penetration testing. You did it – you paid for penetration testing services. Whether it was to fulfill a potential [...]
Global research and advisory firm, Gartner, forecasts that information security spending will exceed $124 billion in 2019, yet cyber defenses continue to fail. Organizations large and small continue to experience [...]
Capital One’s recent data breach is only the latest in the perennial series of high-profile data breaches that have occurred in the last few years. What do Equifax, Home Depot, [...]
Windows Servers are practically irresistible to hackers everywhere. This makes the lone Windows Server a perfect candidate for a honeypot. In this post we explore how to use a Windows Server to divert a hacker’s attention from what matters than by giving them what they think is an easy win!