Update on the Citrix Vulnerability, CVE-2019-19781

by Sarah Harvey / December 15, 2022

On December 17, 2019, Citrix released information about a vulnerability tracked as CVE-2019-19781. This vulnerability lies in Citrix Application Delivery Controller (ADC), formerly known as NetScaler ADC, and Citrix Gateway, formerly known as NetScaler Gateway. Will this the Citrix vulnerability impact your organization? What We Know About CVE-2019-19781 CVE-2019-19781 allows unauthenticated remote attackers to execute arbitrary code on the exposed system. Because of where the Citrix vulnerability resides on the…

Fact or Fiction: Everything You Need to Know about Leading Compliance Initiatives

by Sarah Harvey / February 20, 2023

Why is Compliance is a Top 3 Initiative? It’s no secret that the cyber threat landscape is evolving at an alarming rate. Now more than ever, businesses must implement compliance initiatives to avoid the growing threats of a cyberattack in the new decade. As a leader of your organization, it’s your responsibility to see this through. In this webinar, you’ll learn from KirkpatrickPrice President, Joseph Kirkpatrick, about everything you need…

5 Best Practices to Integrate Cybersecurity With Your Business Strategy

by Sarah Harvey / June 14, 2023

What Does an Effective Business Strategy Look Like? For many businesses, it’s been a long time since the business strategy was initially developed. If it was created a few years ago, it’s likely missing cybersecurity as one of its strategic initiatives. The role of cybersecurity has dramatically changed for the C-suite and should be re-evaluated in terms of its impact on strategy. Any successful business will have a solid definition…

Validating Fixes 30 Days After Your Pen Test – Our Retesting Policy

by Sarah Harvey / June 14, 2023

Every penetration testing firm has unique processes for conducting penetration tests. While there are standards that influence penetration tests, like the OWASP Top Ten, the Open Source Security Testing Methodology Manual (OSSTMM), and the Penetration Testing Execution Standard (PTES), the truth is not all penetration tests are created equally. When hiring a firm to conduct your penetration tests, having a thorough understanding of their methodologies is imperative. How will the…

What to Include in Your Employee Handbook

by Sarah Harvey / June 14, 2023

What’s the purpose of an employee handbook? Why are you required to have a detailed employee handbook to be compliant with information security standards? What should you include in your employee handbook to meet these standards? These are all great questions you might have when you’re preparing for an audit. Let’s start with a quick explanation of the purpose of an employee handbook and how a well-designed handbook can add…