Lessons from Penetration Testing: 7 Real-World Findings

The internet today is swarming with cybercriminals just waiting for the right opportunity to gain a foothold into your organization's network. One of the best ways to stay ahead is to find your organization's weak spots before cyber criminals do. 

Read More >
4 Lessons Learned from the Top Data Breach Lawsuits & Class Action Settlements

It’s always news when corporations have security breaches. This is especially true whenever malicious hackers gain access into a company’s internal databases to steal information— such as credit card or bank details, personal health information (PHI), personally identifiable information (PII), trade secrets of corporations or intellectual property. Often, these data breaches can lead to lawsuits and other legal action against the victim company. 

Read More »
The 2020 Twitter Bitcoin Scam: How it Happened and Key Lessons from Whitehat Hacker Kevin Mitnick

Just yesterday, the notable social media platform Twitter and a number of its high-profile users fell victim to a flashy Bitcoin scam. 

Read More »
8 Password Security Tips from Kevin Mitnick for Better Login Protection

When is the last time you truly considered your password strength and security? While password cracks don’t make the news quite as often as other breaches, they can compromise your systems all-the-same.

Read More »
Penetration Testing vs. Vulnerability Assessments: The Key Differences

While similar in some ways, the often interchangeably used vulnerability assessments and penetration tests are two different beasts. Throw vulnerability scans into the mix and, suddenly, most companies are confused.

Read More »
What's Included in a Penetration Test Report?

Penetration tests are an extremely useful exercise to mitigate risks and patch your security gaps. However, some businesses get the report just to meet compliance standards, then forget about it. 

Read More »
Why Penetration Testing is More Important than Ever in 2020

Early 2020 has been an unprecedented year for businesses, not only across our great nation, but the world at large. Enterprises big and small have shut their doors— and for those that require a storefront or face-to-face interactions to deliver products and services, operations may have come to a grinding halt.

Read More »
How to Plan & Host an Incredible Virtual Event

With stage events coming to a dramatic halt during the COVID-19 pandemic, event planners and speakers are forced to pivot. To stay agile during this uncertain time, many companies are beginning to host virtual events

Read More »
Tips for Event Planners Booking a Speaker for a Virtual Conference

As an event planner looking to host a virtual conference, you want to hire engaging talent to entertain your digital audience. 

Read More »
Understanding the 6 Main Types of Penetration Testing

You’re considering conducting a formal penetration test to expose vulnerabilities within your system, but where to start? Upon some quick research, you discover that there’s actually more than one type of penetration test— and suddenly you’re lost in a jungle of jargon, asking yourself some confusion questions: 

Read More »