Support & Downloads

Quisque actraqum nunc no dolor sit ametaugue dolor. Lorem ipsum dolor sit amet, consyect etur adipiscing elit.

s f

Contact Info
198 West 21th Street, Suite 721
New York, NY 10010
youremail@yourdomain.com
+88 (0) 101 0000 000
Follow Us

Author: robond

The Fundamentals of Web App Penetration Testing A couple of blog posts ago we went through the fundamentals of Web Application Penetration Testing. We suggested that a web application penetration test is an assessment of the security of the code and the

Last week US government offices were targeted by one of the most sophisticated and severe attacks seen in history both because of the sophistication and scope. A series of mega cyber-attacks were launched and thus far it appears were conducted

The Fundamentals of Web App Penetration Testing First, let’s start with what a Web App Penetration Test is and list the different names and service synonyms that you may see that typically mean the same thing as a web app penetration

Designing and Implementing a Risk-Based Patch Management Program In this blog post, we wanted to take an additional step into explaining the benefits of quality vulnerability management, vulnerability assessments and patch management. We have discussed the topic at your request in

The 5 Basic Steps to Building a Zero Trust Network Zero Trust is a network security model, based on a strict identity verification process. The framework dictates that only authenticated and authorized users and devices can access applications and data -

Risk Management Comes Back into Focus – Part 2 In our last blog post, Security Leaders Grapple with Understanding Their Own Cybersecurity Risk – Part 1 we quoted a recent Forrester Survey which polled IT Security leaders on their ability to

Risk Management Comes Back into Focus Less than 50% of IT Security leaders are able to measure or quantitatively understand their organization’s level of risk. According to a study published by Forrester, just 51% of the security pro’s that were surveyed

How Vulnerability Assessments Differ Across Providers In our Vulnerability Management – A Best Practice blog post, we suggested vulnerability assessments were the process of scanning for and identifying possible vulnerabilities and risks within an organization’s systems. We further suggested that vulnerability

Overcoming the Challenges of Firewall and SIEM Management This blog post is not a commercial for SecureOps; we have just worked with enough clients to know that tuning firewalls and managing SIEMs, particularly handling the hundreds, if not thousands of security