Top Pentest Findings in 2022 from a First Year Pentester

Top Pentest Findings in 2022 from a First Year Pentester

The year 2022 has wrapped up and I find it helpful to share some of the most common findings I have encountered throughout the year. Some of these may not be surprising as they are covered in almost every cybersecurity awareness training course there is. However, it...
How Open-Source Intelligence Impacts You

How Open-Source Intelligence Impacts You

  OSINT OSINT stands for Open-Source Intelligence. It is the action of gathering information that is publicly available and analyzing it for intelligence purposes.   First, let’s look at what type of data can be considered Open-Source. Data or information...
How Hackers Target You

How Hackers Target You

When creating a defensive plan against cyber-attacks, knowing your adversary is paramount. Often after the shock has worn off from a breach, the affected company will ask themselves, “Why us?”. It’s a valid question that organizations should ask...
How Often Should You Schedule a Penetration Test?

How Often Should You Schedule a Penetration Test?

In today’s world, massive data breaches and sophisticated malware litter news headlines. Unfortunately, it often feels as though it’s more when your organization will fall victim, rather than if. Still, many organizations choose to only meet baseline...