The Fundamentals of Web App Penetration Testing
The Fundamentals of Web App Penetration Testing First, let’s start with what a Web App Penetration Test is and list the different names and service synonyms that you may see that
Taking a Risk-Based Approach to Patch Management
Designing and Implementing a Risk-Based Patch Management Program In this blog post, we wanted to take an additional step into explaining the benefits of quality vulnerability management, vulnerability assessments and patch
The 5 Steps to Building a Zero Trust Network
The 5 Basic Steps to Building a Zero Trust Network Zero Trust is a network security model, based on a strict identity verification process. The framework dictates that only authenticated and
Security Leaders Grapple with Understanding Their Own Cybersecurity Risk – Part 2
Risk Management Comes Back into Focus – Part 2 In our last blog post, Security Leaders Grapple with Understanding Their Own Cybersecurity Risk – Part 1 we quoted a recent Forrester