top of page
Search
Craft Compliance
Mar 16, 20222 min read
7 Steps To Website Security Worth Bragging About
Customers are increasingly concerned about the security of the products they use. In a 2018 survey, Pew Research reported that 79% of...
Craft Compliance
Feb 18, 20222 min read
How To Validate Security Controls To Make For Better Cybersecurity
Trust but verify is an age old security adage. An adage passed down from the original cavemen security engineers, whose passwords were...
Craft Compliance
Jan 31, 20222 min read
How To Choose The Best Third Party Vendor For First Rate Cybersecurity
Third party vendors are a great option for your business—but how do you know how to choose the right third party vendor?
Craft Compliance
Jan 14, 20222 min read
How To Get Stronger WordPress Website Security: See Our Favorite Tool
How can you ensure your WordPress website is secure? Here are two ways to get started.
Craft Compliance
Jan 7, 20222 min read
How To Make Sure You Have Better Cybersecurity In 2022
It is officially a new year. A chance for a clean slate and opportunity to start fresh. Will 2022 be a year of better security? Or will...
Craft Compliance
Dec 16, 20212 min read
How To Make Sure Your WordPress Website Has Adequate Security
WordPress is a fantastic tool to make awesome websites, but it has a bad track record for security issues and vulnerabilities. It’s...
Craft Compliance
Nov 29, 20212 min read
Why Availability Is Important For Your Business To Succeed On Black Friday
The overriding security concern for businesses during Black Friday and the holidays is simple: availability.
Craft Compliance
Nov 18, 20212 min read
How To Ensure Your Company Has Security Its Customers Can Really Trust
Instead of thinking about the cost of quality security, companies should think about the gains instead. Have security worth bragging about.
Craft Compliance
Nov 5, 20213 min read
How We Focus On The Critical Path In Your Security and IT Solutions
Focusing on the critical path is key for effective, high-value security and IT solutions.
Nat Shere
Oct 25, 20214 min read
The "We Take Your Security Seriously" Myth
The U.S. State Department suffered a data breach but they still "take your security seriously". Is that a contradiction? It can be...
Nat Shere
Oct 12, 20213 min read
Getting the Most out of Penetration Testing
Not all penetration tests are the same. Some tests provide tremendous value for the relevant client. Others… less so.
Nat Shere
Oct 5, 20214 min read
Penetration Testing: The What, the Why, the How
Penetration testing can mean different things to different people, but we break down the differences and why each is important.
Nat Shere
Sep 27, 20212 min read
Time to Upgrade Password Security
At this point, everyone knows the basic rules for good passwords, but it is time to give them a major upgrade with some simple principles
Nat Shere
Sep 2, 20213 min read
Teaching Security Awareness Effectively
A strong security culture needs to be built on positive feedback, not shame. Also, discover the financial impact of the SolarWinds attack.
Nat Shere
Aug 24, 20214 min read
Hacking Isn't Like the Movies
Hacking isn't like the movies, but sometimes it is still exciting. All the better when it happens when the manager is watching too.
Nat Shere
Aug 16, 20214 min read
Pass the Passwords
Credential stuffing is on the rise, with more than 193 billion failed login attempts in 2020. Learn about what can be done.
Nat Shere
Aug 3, 20213 min read
Security News Updates
From gas shortages to federal policy changes, we breakdown some of the latest stories that affect the security industry
Nat Shere
Jul 7, 20214 min read
Comparing Web App Scanners
Analyzing the effectiveness and ease of use of a new web application scanner against three of the most popular and established on the market
Nat Shere
Jun 17, 20213 min read
Covering Your Assets
How good asset management can help the security team avoid surprises.
Nat Shere
Jun 3, 20213 min read
Don't Reinvent the Wheel
Developing your own security controls can be dangerous as one of our pentesters walks through how we easily breached a custom login page.
bottom of page