Over years of penetration testing, HALOCK has seen some enduring security vulnerabilities. They are so common, in fact, that we have come to expect to see them in the field. Many information security breaches occur because authentication vulnerabilities permit unauthorized access to applications, systems and data. If you were to follow these tips, our penetration […]
PREPARING FOR YOUR DATA BREACH. Author: Chris Cronin, ISO 27001 AuditorMost InfoSec professionals don’t want to think about becoming the next victim of a major data breach to make the headlines. And yet when faced with another major data breach it is a time when Executive Management and security teams reflect on their own insecurities. The […]
I’m going to refer to another something in a previous blog, the one about Verizon’s 2012 Data Breach Report.