FTC Safeguards Rule: What you Need to Know
What is the FTC Safeguards Rule? Initially established in 2003, the FTC Safeguards Rule outlines data security guidelines for organizations…
What is the FTC Safeguards Rule? Initially established in 2003, the FTC Safeguards Rule outlines data security guidelines for organizations…
As a full-service information security management company, FRSecure works to protect sensitive business information from unauthorized access, distribution, and destruction.…
With recent high-publicity attacks involving IoT technology such as the Colonial Pipeline attack and the Florida water treatment plant attack,…
As I sit by the stream, I’m enamored by the fluid dynamics of the water. It trickles gracefully and effortlessly…
Let’s talk about Mimikatz and golden ticket attacks! And we don’t mean the Wonka bars, but something far more malicious.…
Investigating lateral movement activities involving remote desktop protocol (RDP) is a common aspect when responding to an incident where nefarious…
How many logons do you have? Zero! You’re a threat-actor; you have zero logons, and you need some. Enter our…
Penetration tests are useful tools in understanding your company’s vulnerabilities, but they don’t always make sense. If your testing doesn’t…
Penetration testing is an important part of information security, but it may not be right for your organization. Learn about…
Subnets are a cost-effective measure that provides value to other technical controls, vulnerability scanning, logging, alerting, and can even limit…
All right! I thought that after last month’s thrilling conclusion to our Pen Testing 101 series I would be able…
Hello and thanks for joining me in the fourth (and probably final for now) series about ethical hacking with penetration…