The Fundamentals of Web App Penetration Testing
The Fundamentals of Web App Penetration Testing First, let’s start with what a Web App Penetration Test is and list the different names and service synonyms that you may see that typically mean the same thing as a web app penetration
Taking a Risk-Based Approach to Patch Management
Designing and Implementing a Risk-Based Patch Management Program In this blog post, we wanted to take an additional step into explaining the benefits of quality vulnerability management, vulnerability assessments and patch management. We have discussed the topic at your request in
The 5 Steps to Building a Zero Trust Network
The 5 Basic Steps to Building a Zero Trust Network Zero Trust is a network security model, based on a strict identity verification process. The framework dictates that only authenticated and authorized users and devices can access applications and data -
Security Leaders Grapple with Understanding Their Own Cybersecurity Risk – Part 2
Risk Management Comes Back into Focus – Part 2 In our last blog post, Security Leaders Grapple with Understanding Their Own Cybersecurity Risk – Part 1 we quoted a recent Forrester Survey which polled IT Security leaders on their ability to