AWS Security for S3 and EC2

by Sarah Harvey / December 15, 2022

Best Practices for AWS Security AWS brings new opportunities for businesses to innovate, build, and grow – but what about the data in the cloud? Is it protected? How likely is it to be compromised? The 2019 Cloud Adoption and Risk Report from McAfee reports that the sharing of sensitive data in the cloud is increasing 53% year-over-year. The average enterprise generates over 3 billion events every month in the…

Executive Insight into the Importance of Penetration Testing

by Sarah Harvey / February 20, 2023

Getting the Most Out of Your Penetration Test You’ve seen hacking portrayed in Hollywood films, but have you seen how hackers can be an ally in your fight for security? Ethical hacking plays a key role in identifying what malicious outsiders are planning against your organization’s sensitive assets. If you’ve been wondering about the trends in penetration testing and how other organizations utilize these tests to creatively improve security, download…

Finding and Mitigating Your Vulnerabilities Through OWASP

by Sarah Harvey / December 15, 2022

What is OWASP? The Open Web Application Security Project, or OWASP, is an open, online community that provides free tools and documentation to anyone interested in improving insecure software and in developing, operating, and maintaining secure software. OWASP is a not-for-profit organization, with no affiliation to any company, making it a popular methodology to rely on. OWASP’s core values are: open, innovation, global, and integrity. OWASP prides itself on being…

Pen Testing After a Significant Change

by Sarah Harvey / December 15, 2022

Penetration testing, or pen testing, is a proactive way that organizations can improve their security hygiene and assure their clients that the products and services they provide are as secure as possible. While many enterprises rely on internal audit teams to test the security of their networks, applications, and devices, undergoing third-party penetration testing is a surefire way to identify overlooked or unknown vulnerabilities, find remediation strategies and guidance, and…

Avoiding a Pen Testing Mishap: What Are You Really Paying For?

by Sarah Harvey / December 15, 2022

Last month, the Iowa Judicial Branch made an investment in their security efforts by partnering with an information security firm to perform penetration testing on their organization. But…it appears they signed up for more than they bargained for. Why? The two ethical hackers working the job were arrested after they successfully gained unauthorized access to a Dallas County courthouse. What went wrong? Why were these ethical hackers arrested? Could this…