Home/Tag: pentest

Productive Hacking: 5 Indicators of a Quality Penetration Test

Key elements of penetration tests that actually work for you.

Everyone seems to have a different idea of what a penetration test is.

Does it involve phishing employees? What about running port scans? Is it just checking for vulnerabilities and reporting them to management? Is the creepy, hooded person just going to “get in” from the outside and tell you what they could […]

By |2020-07-06T04:14:50+00:00July 6th, 2020|Penetration Testing|0 Comments

A Red Teamer’s Trip to the Doctor

The things that go through a security professional’s head during a regular doctor’s visit, why they matter to the healthcare industry, and why they should matter to you.

Healthcare organizations are the stewards of troves of very private and personal information.

This makes them high-value targets of all sorts of attacks from malicious parties. Additionally, national regulations such as HIPAA call for

By |2020-04-12T17:49:23+00:00April 13th, 2020|Penetration Testing, Regulatory Compliance|1 Comment

Are Pen Test and Vulnerability Scans Required for a SOC 2 Report?

Are Pen Test and Vulnerability Scans Required for a SOC 2 Report? There has been much confusion lately in the SOC 2 market as companies seek to understand the need-to-haves vs. the nice-to-haves when it comes to obtaining a SOC 2 report.  Much of this confusion was brought about by the December 2018 upgrade of the Trust Services Criteria, and associated Point of Focus, intended to align SOC 2 with the 2013 COSO framework.

By |2020-01-17T21:17:50+00:00March 20th, 2019|IT Audit & Compliance, SOC Reporting|1 Comment

Analyzing Your Attack Surface Like A Hacker

When most people think of hacking, they think of what Hollywood portrays. In a dark basement, a hooded, perhaps tattooed outcast rapidly types nonsensical keystrokes at a flashy computer monitor for several seconds before snidely muttering, “I’m in.”

By that representation, the hacking process seems pretty straightforward: find a vulnerability, exploit it and ride off into the sunset with a bunch of […]

By |2020-01-17T21:17:55+00:00October 8th, 2018|Cyber Risk Management, IT Audit & Compliance|0 Comments