Cybersecurity Assessments | Penetration Testing
By:
Philip Holbrook
February 1st, 2022
These days, Mac-based corporate environments can be likened to the Tooth Cave Spider.
Cybersecurity Assessments | SOC Examinations
By:
JORDAN HICKS
January 26th, 2022
Though cybercrime reportedly rose 600% due to the global pandemic we’re in, it’s been a steadily growing problem for years. As you may know, suffering a data breach means you also suffer extra mitigation costs, but more critically, you lose the trust of your customer. That’s something you absolutely need to avoid, and SOC for Cybersecurity–created to help organizations particularly worried about cyberattacks–can help you do that.
Cybersecurity Assessments | Payment Card Assessments
By:
Sully Perella
January 14th, 2022
Did you know? With over 69 years on the throne, Queen Elizabeth II is the longest reigning monarch in British history. After her, Charles, the Prince of Wales will ascend to the throne, his son William will follow, and so on.
By:
Schellman
December 22nd, 2021
Maybe you’re ahead of the game, but in today’s day and age, more and more organizations are recognizing the inherent advantages to fostering a multigenerational workforce.
Cybersecurity Assessments | Penetration Testing
By:
Rene Guerra
November 18th, 2021
(And Why I Did It) For those of you who work in web application security, maybe you’re familiar with Burp.
Cybersecurity Assessments | Payment Card Assessments | NIST | PCI DSS
By:
Sully Perella
June 30th, 2021
These days, you can never have too many cybersecurity measures in place, particularly given how regularly threats continue to escalate and grow in sophistication. Now, many organizations are turning to, or considering adopting, Zero Trust (ZT)—a less traditional security model based on the principle of "never trust, always verify.”
Cybersecurity Assessments | Penetration Testing
By:
MATT WILGUS
June 17th, 2021
During a penetration test, the Schellman team often works with development teams, administrators, risk and compliance professionals and information security personnel; however, the initial point of contact for a penetration test may be an individual that isn’t any of those. More and more, someone from the product or procurement team may have the responsibility—or shared responsibility—of having a penetration test performed. While these individuals may understand a timeline for a specific task, they likely do not have full visibility into the entire project. Such circumstances, among others, can trigger one of the biggest challenges frequently seen in planning pen tests—timing.