Man working on computer

How to Build an IT Asset Management Plan

by Sarah Harvey / June 14, 2023

How you can best manage your data and assets in a time where information security threats are everywhere? What is asset management and where do you start with it? Let's start with a basic definition. Asset management is properly defining and categorizing an organization’s assets. A well-developed asset management plan can help you make strategic moves to increase your organizational security. With any plan for IT asset management in place,…

Update on the Citrix Vulnerability, CVE-2019-19781

by Sarah Harvey / December 15, 2022

On December 17, 2019, Citrix released information about a vulnerability tracked as CVE-2019-19781. This vulnerability lies in Citrix Application Delivery Controller (ADC), formerly known as NetScaler ADC, and Citrix Gateway, formerly known as NetScaler Gateway. Will this the Citrix vulnerability impact your organization? What We Know About CVE-2019-19781 CVE-2019-19781 allows unauthenticated remote attackers to execute arbitrary code on the exposed system. Because of where the Citrix vulnerability resides on the…

Fact or Fiction: Everything You Need to Know about Leading Compliance Initiatives

by Sarah Harvey / February 20, 2023

Why is Compliance is a Top 3 Initiative? It’s no secret that the cyber threat landscape is evolving at an alarming rate. Now more than ever, businesses must implement compliance initiatives to avoid the growing threats of a cyberattack in the new decade. As a leader of your organization, it’s your responsibility to see this through. In this webinar, you’ll learn from KirkpatrickPrice President, Joseph Kirkpatrick, about everything you need…

5 Best Practices to Integrate Cybersecurity With Your Business Strategy

by Sarah Harvey / June 14, 2023

What Does an Effective Business Strategy Look Like? For many businesses, it’s been a long time since the business strategy was initially developed. If it was created a few years ago, it’s likely missing cybersecurity as one of its strategic initiatives. The role of cybersecurity has dramatically changed for the C-suite and should be re-evaluated in terms of its impact on strategy. Any successful business will have a solid definition…

Validating Fixes 30 Days After Your Pen Test – Our Retesting Policy

by Sarah Harvey / June 14, 2023

Every penetration testing firm has unique processes for conducting penetration tests. While there are standards that influence penetration tests, like the OWASP Top Ten, the Open Source Security Testing Methodology Manual (OSSTMM), and the Penetration Testing Execution Standard (PTES), the truth is not all penetration tests are created equally. When hiring a firm to conduct your penetration tests, having a thorough understanding of their methodologies is imperative. How will the…