Blog

Cybersecurity Risk Assessment Common Findings: Software Inventory and Controls

What are the most common findings in a formal cybersecurity risk assessment, in regards to software inventory and controls? In the video below, Mike Smith explains how simply a lack of inventory is the obvious, yet most common finding, in

Read more ›

Penetration Test vs. Vulnerability Scan: What is the difference?

What is the difference between a penetration test and vulnerability scan, for cybersecurity? In the video below, Mike explains the main differentiators, including how a vulnerability scan is often part of a good penetration test. He also discusses how a

Read more ›

Cybersecurity Risk Assessment Common Findings: Asset Inventory and Control

When you’re performing a cybersecurity risk assessment for your company, what are some of the most common findings, pertaining to asset inventory and control? In the video below, Mike explains that lack of inventory is the obvious one here, but

Read more ›

Penetration Testing Services Comparison: What is an External Pen Test?

What is an external pen test? In the video below, Mike continues his video series on penetration testing services comparisons… this time explaining an external pen test, and how it compares to the other 3 types. Want Mike’s recommendations on

Read more ›

Cybersecurity Risk Assessment Steps

What steps are involved in a cybersecurity risk assessment? In the video below, Mike Smith explains his opinion on the 11 steps involved in a cybersecurity risk assessment, and the order in which they should be taken. Want Mike’s recommendations

Read more ›