Author: Heath Adams

  • Blog
  • Author: Heath Adams
Is “After-Hours” Testing Worth It?

Is “After-Hours” Testing Worth It?

A concern we often hear while scoping security assessments is around impacting the current operating rhythm of an organization. This is a valid concern as the last thing an IT leader wants is to negatively impact the business when it could have been avoided. The first inquiry is usually to test after-hours or during non-standard

Read More
Top 5 Ways COVID Has Changed Security Assessments

Top 5 Ways COVID Has Changed Security Assessments

There is no doubt that COVID has changed how the world conducts business, so it’s no surprise that security assessments have as well. The increase in remote employees and the need for availability of applications and resources from afar has disrupted organizational security postures. Below we’ll share what we’ve been seeing on assessments since the

Read More
So You Want to Be a Hacker: 2021 Edition

So You Want to Be a Hacker: 2021 Edition

Video Version: Introduction Recently, I posted a 36-part Twitter thread (https://twitter.com/thecybermentor/status/1343471814132031488) on how to become an ethical hacker in 2021. Given that it was well received, I thought it might be better to put all of that information into a more digestible page. So, without further ado, let’s chat about how you can break into

Read More
Pentest Tales #001: You Spent How Much on Security?

Pentest Tales #001: You Spent How Much on Security?

Pentest Tales #001: You Spent How Much on security? Welcome to the first edition of Pentest Tales, a blog series that walks through real-world pentests we’ve performed in the past.  The purpose of this blog is not just to share the “owning” of a domain, but to provide education as to why a domain was

Read More
Buffer Overflows Made Easy

Buffer Overflows Made Easy

For most people breaking into cyber security, buffer overflows can be hard for someone to wrap their mind around. My goal is that by the end of this tutorial, the average reader will have a clearer understanding and less fear of buffer overflows.

Read More
Differences Between a Vulnerability Scan and a Penetration Test

Differences Between a Vulnerability Scan and a Penetration Test

Two of the most common questions clients ask are: What’s the difference between a vulnerability scan and penetration test and what option is best for my company? The differences between a vulnerability scan and penetration test are often confused. Let’s take a look at the key differences between the two options and paint a clearer picture on what option you should choose for your company.

Read More