Blog
Cybersecurity Risk Assessment Common Findings: Software Inventory and Controls
What are the most common findings in a formal cybersecurity risk assessment, in regards to software inventory and controls? In the video below, Mike Smith explains how simply a lack of inventory is the obvious, yet most common finding, in…
Penetration Test vs. Vulnerability Scan: What is the difference?
What is the difference between a penetration test and vulnerability scan, for cybersecurity? In the video below, Mike explains the main differentiators, including how a vulnerability scan is often part of a good penetration test. He also discusses how a…
Cybersecurity Risk Assessment Common Findings: Asset Inventory and Control
When you’re performing a cybersecurity risk assessment for your company, what are some of the most common findings, pertaining to asset inventory and control? In the video below, Mike explains that lack of inventory is the obvious one here, but…
Penetration Testing Services Comparison: What is an External Pen Test?
What is an external pen test? In the video below, Mike continues his video series on penetration testing services comparisons… this time explaining an external pen test, and how it compares to the other 3 types. Want Mike’s recommendations on…
Cybersecurity Risk Assessment Steps
What steps are involved in a cybersecurity risk assessment? In the video below, Mike Smith explains his opinion on the 11 steps involved in a cybersecurity risk assessment, and the order in which they should be taken. Want Mike’s recommendations…