Productive Hacking: 5 Indicators of a Quality Penetration Test
Key elements of penetration tests that actually work for you. Everyone seems to have a different idea of what a penetration test is. Does it involve phishing employees? What about [...]
Key elements of penetration tests that actually work for you. Everyone seems to have a different idea of what a penetration test is. Does it involve phishing employees? What about [...]
This webinar will define and explain common penetration test offerings in detail, outline the key differences and benefits, and help you decide which engagement type is the best fit for [...]
The things that go through a security professional’s head during a regular doctor's visit, why they matter to the healthcare industry, and why they should matter to you. Healthcare organizations [...]
Or: how I learned to stop worrying and love AWS GPU clusters. Photo by Alberto Frías on Unsplash Passwords are terrible. And I don’t mean just your Netflix password or [...]
Are Pen Test and Vulnerability Scans Required for a SOC 2 Report? There has been much confusion lately in the SOC 2 market as companies seek to understand the need-to-haves vs. the nice-to-haves when it comes to obtaining a SOC 2 report. Much of this confusion was brought about by the December 2018 upgrade of the Trust Services Criteria, and associated Point of Focus, intended to align SOC 2 with the 2013 COSO framework.
When most people think of hacking, they think of what Hollywood portrays. In a dark basement, a hooded, perhaps tattooed outcast rapidly types nonsensical keystrokes at a flashy computer monitor [...]