Category: Penetration Testing

ftc safeguards rule blog header

FTC Safeguards Rule: What you Need to Know

What is the FTC Safeguards Rule? Initially established in 2003, the FTC Safeguards Rule outlines data security guidelines for organizations…

Read post
IoT penetration testing is snake oil

IoT Penetration Testing is Futile

With recent high-publicity attacks involving IoT technology such as the Colonial Pipeline attack and the Florida water treatment plant attack,…

Read post
Phishing with Minks

A Unique APT Attack: Phishing with Minks

As I sit by the stream, I’m enamored by the fluid dynamics of the water. It trickles gracefully and effortlessly…

Read post

Making Sense of RDP Connection Event Logs

Investigating lateral movement activities involving remote desktop protocol (RDP) is a common aspect when responding to an incident where nefarious…

Read post
7 Ways Penetration Test Results Can be Overrated

7 Ways Penetration Test Results Can be Overrated

Penetration tests are useful tools in understanding your company’s vulnerabilities, but they don’t always make sense. If your testing doesn’t…

Read post
What the Heck Happened to Subnetting?

What the Heck Happened to Subnetting?

Subnets are a cost-effective measure that provides value to other technical controls, vulnerability scanning, logging, alerting, and can even limit…

Read post
Pen Testing 101: This is Sparta!

Pen Testing 101: This is Sparta!

All right! I thought that after last month’s thrilling conclusion to our Pen Testing 101 series I would be able…

Read post
act like a pirate

Pen Testing 101: Act Like a Pirate

Hello and thanks for joining me in the fourth (and probably final for now) series about ethical hacking with penetration…

Read post