top of page
SCHEDULE A CALL
Log In
Home
Overview
Services
All Services
Penetration Testing
MSSP Services
Risk Assessments
vCISO Services
Who We Are
Blog
Contact
Education
Resources
Expand your knowledge by reading from our experts
All Posts
Cyber Security Use Cases
Penetration Testing
vCISO
Risk & Compliance
Managed Security Services
General Security
Vulnerability Management
David Sockol
5 min read
HOW TO PIVOT YOUR SOC TO SUPPORT A REMOTE WORKFORCE
David Sockol
4 min read
DFARS INTERIM RULE: DAMNED IF YOU DO... DAMNED IF YOU DON'T
David Sockol
5 min read
THE ONE MILLION DOLLAR PLUS MANAGED SECURITY SERVICE PROVIDER BLUNDER
David Sockol
4 min read
HOW TO WRITE A PENETRATION TESTING RFP
brennanegan
2 min read
What is CMMC and Why is it Important?
David Sockol
7 min read
DECIPHERING THE DOD 18-PAGE INTERIM RULE (DFARS, FAR, CMMC)
Patrick Cleary
3 min read
5 UNHEALTHY PASSWORD HABITS THAT ARE HURTING YOUR CYBERSECURITY
Joe Nay
4 min read
THE 6 STEPS OF PENETRATION TESTING
Arthur Borrego
3 min read
PENETRATION TESTING REMEDIATION FAQ'S
Chris Odom
3 min read
AFTER THE PENTEST REPORT… REMEDIATION
Brennan Egan
4 min read
10 Steps to Writing a Useful Penetration Test Report
Chris Odom
4 min read
HOW TO CONDUCT A PENETRATION TEST
Chris Odom
5 min read
10 STEPS TO MATURE YOUR CYBER SECURITY PROGRAM
Chris Odom
3 min read
HOW TO SCOPE YOUR PENETRATION TEST
Chris Odom
6 min read
PHASES OF PENETRATION TESTING
Chris Odom
2 min read
WHY YOU NEED PENETRATION TESTING RULES OF ENGAGEMENT AS PART OF YOUR PENETRATION TEST
Chris Odom
2 min read
THE 12 SECURITY CONTROLS THAT ACCOUNT FOR 60% OF I.T. PERFORMANCE
Jens Laundrup, CISSP
3 min read
RISK MANAGEMENT APPLICATIONS IN REAL LIFE
Paul Underwood
5 min read
CORONAVIRUS - WHAT'S HAPPENING, WHAT EMPLOYERS SHOULD DO, & WHAT EMPLOYEES SHOULD DO
Chris Odom
2 min read
IS GDPR RELEVANT TO ME?
2
3
4
5
6
bottom of page