Uncategorized

ptx-cloud-security-blog-1920x744_0.jpg

Though the common vernacular is “The Cloud,” the truth is, there are multiple cloud environments and providers available to organizations looking to utilize this growing technology. Read on to learn about the different types of cloud environments, and the biggest security obstacle each presents. Cloud…

Read More

cybersecurity-generic-article-hologram-900x412_0.gif

We all know that to err is human. The problem is some mistakes are an order of magnitude larger than others. If you forget to buy apples at the store, that’s unfortunate. But if you forget to lock down your cloud server with…

Read More

cybersecurity-generic-blog-cloud-lock-1920x744_1.gif

Speed is essential in today’s business climate, hence the rise of DevOps. Unifying development and operations compresses development cycles and enables more frequent deployments that align closely with business objectives. It’s no wonder executives love DevOps. But one question is often left unasked in…

Read More

cryptojacking-banner-1920x744.jpg

It’s hard to escape hearing about cryptocurrency these days. But this new monetary system is not utilized by a large percent of the population, and is incredibly complex, so many of us are left to simply smile and nod when it’s brought up…

Read More

secure-transactions-pci-dss-pa-dss-overview-and-compliance-checklist-700x350.png

pci

With the advent of the Internet in the late 1990s, credit card fraud surged. Though credit card companies came out with their own individual security programs, merchants accepting multiple types of credit cards had difficulty meeting multiple standards.  Eventually, credit card companies banded…

Read More

sox-compliance-and-security-700x350.png

sox compliance

Back in the late 90s and early 2000s, a number of instances of financial fraud were uncovered in large public corporations, leading to a growing feeling of distrust in the market. Back in 2001, for instance, a scandal surrounded the American energy company…

Read More

I read somewhere that your security is only as good as the measures you use to test it, which makes sense, and which explains the shift we have seen in the past few years in the security market. Penetration testing, aka ethical hacking,…

Read More

privileged-access.png

Bridge at night with lights shining

The term "privileged access" has become a hot topic as of late. For the first time in history, the Verizon Data Breach Investigations Report actually included privileged access as its own section in the report with some not so surprising results. Couple of…

Read More

Big or small, every organization has accounts that hold ‘keys to the kingdom’ credentials. Almost every account holds some level of privilege that can potentially be compromised, resulting in not only financial, but reputational damage. Looking at top patterns in the 2016 Verizon…

Read More

You think that you're safe, that your network is secure, that your firewalls are protecting you...but how will you know if you don't test it? A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely…

Read More