We all know it has been one heck of a year, one full of challenges at many levels. While we all contend with different types of threats across a variety of fronts, one threat that cannot be ignored is the tsunami of cyberattacks that have accelerated during the era of COVID.
How a retailer with both brick and mortar and online stores reduced overhead costs to allow re-investment into the business by validating PCI DSS compliance through penetration testing.
“Cipher stuffing modifies the fingerprint of communications encrypted with secure sockets layer (SSL) and transport layer security (TLS).“ – Dark Reading
Our Pen Testers have seen quite a few security environments and can identify typical vulnerabilities in organizations of all sizes and industries. Below is list of
The importance of penetration testing, or (pen testing), has noticeably increased in recent years due to a number of reasons.
Even with advanced technology and security, your data is still at risk. Studies indicate that hackers are focusing on your teams to gain access to your networks and information. Social engineering is on the rise. This is a method of manipulating your teams into performing actions in order for an unauthorized person to get access […]
The 12th Annual ISSA and ISACA Chicago Chapters Security Conference and Networking Cruise – HALOCK was a proud attendee and sponsor at the educational and networking event. It was wonderful to connect with infosec leaders in the Chicagoland area. We hope to meet more in future events.
Two things are inherently true when it comes to cyber criminals. The first is that they follow the money. This is why ransomware grew to a billion dollar business overnight. The second is that like water, their efforts flow towards the path of least resistance. Cyber criminals are like many people, they go for the […]
Both penetration tests and automated vulnerability scans are useful tools for managing vulnerabilities. While these are different testing methods, they are complementary and both should be performed.
Why Penetration Testing is Essential. Servers, applications, remote users and other services, once connected to your network, pose a risk to your organization. Hackers and malicious users, both internally and externally, may attempt to exploit security weaknesses to gain access to sensitive information assets.