Threat Informed Defense (Part 1): Threat Simulation [A Webinar Recap]
by Tori Thurmond / April 18th, 2024
Cyber threats pose significant risk to organizations worldwide, ranging from financial loss to reputational damage to operational disruptions. These ever-evolving threats can be intimidating,…
Notes from the Field: CIS Control 16 – Application Software Security
by Greg Halpin / April 3rd, 2024
Recently, I’ve been working with a small Software as a Services (SaaS) company, and it quickly became clear they didn't have much in place…
Understanding the Hospital Cyber Resiliency Landscape Analysis
by Hannah Grace Holladay / March 12th, 2024
The United States Healthcare and Public Health (HPH) sector is facing a dramatic increase in cyber-attacks that are disrupting patient care and safety. Hospitals…
What You Need to Know About OSSTMM
by Hannah Grace Holladay / December 21st, 2023
What is the Open Source Security Testing Methodology Manual (OSSTMM)? The Open Source Security Testing Methodology Manual, or OSSTMM, is a peer-reviewed methodology for…
What Are the Penetration Testing Steps?
by Tori Thurmond / July 18th, 2023
If your organization or technology hasn’t gone through a penetration test or security testing before, you may not know what to expect. Even if…