Blog
Insights for Reasonable Cyber Security and Compliance
What’s happening in the world of cybersecurity? How do you define 'reasonable' security controls? Which cyber threats can be prevented? What steps should you take to make your systems safer? Read our blog posts to gain new insights into cybersecurity news, security awareness, the latest threats and risks, penetration testing, compliance, regulations and so much more.
What is Cipher Stuffing and How is it Relevant?
“Cipher stuffing modifies the fingerprint of communications encrypted with secure sockets layer (SSL) and transport layer security (TLS).“
– Dark Reading (more…)PCI Software Security Framework
For businesses using PA-DSS assessed applications the time is near to start considering the new Software Security Framework that the PCI Council that will be mandated soon. (more…)
Techno Security & Digital Forensics Conference
HALOCK’s Tod Ferran will be presenting, The Questions a Judge Will Ask You After a Data Breach on June 3, 2019 at the Techno Security and Digital Forensics Conference in Myrtle Beach, SC.
(more…)Know Where Your Next Attack is Coming From
At the CAMP IT Conference, HALOCK’s Todd Becker, Principal Consultant, and Steve Lawn, Senior Consultant, presented “KNOW WHERE YOUR NEXT ATTACK IS COMING FROM: Attack prediction and resource prioritization using community-sourced data.”
(more…)