Blog

Cybersecurity Risk Assessment Common Findings: Data Protection

What are the most common findings, when a 3rd party performs a cybersecurity risk assessment for a company, specifically in regards to data protection? In the video below, Mike explains a few easy things your company can implement for data

Read more ›

Cybersecurity Risk Assessment Common Findings: Software Inventory and Controls

What are the most common findings in a formal cybersecurity risk assessment, in regards to software inventory and controls? In the video below, Mike Smith explains how simply a lack of inventory is the obvious, yet most common finding, in

Read more ›

Penetration Test vs. Vulnerability Scan: What is the difference?

What is the difference between a penetration test and vulnerability scan, for cybersecurity? In the video below, Mike explains the main differentiators, including how a vulnerability scan is often part of a good penetration test. He also discusses how a

Read more ›

The Best SASE SD-WAN Vendors: Secure Remote Access

The best SASE (Secure Access Service Edge), SD-WAN vendors all have this in common: Secure Remote Access. In the video below, Mike details the benefits that Secure Remote Access, delivers to companies, when included with a SASE SD-WAN solution. He

Read more ›

Cybersecurity Risk Assessment Common Findings: Asset Inventory and Control

When you’re performing a cybersecurity risk assessment for your company, what are some of the most common findings, pertaining to asset inventory and control? In the video below, Mike explains that lack of inventory is the obvious one here, but

Read more ›

Penetration Testing Services Comparison: What is Physical Security pen testing methodology?

What is physical security penetration testing methodology? In the video below, Mike continues his video series, comparing pen testing services, by explaining physical security penetration testing, and contrasting it to the other three types. Want Mike’s recommendations on which pen

Read more ›

Penetration Testing Services Comparison: What is Social Engineering Pen Testing Methodology?

What is “social engineering” penetration testing methodology? In his latest video, Mike continues his series on comparing penetration testing services, by explaining social engineering methodology. He defines this pen testing method and gives several examples of what vendors can do

Read more ›

Penetration Testing Services Comparison: What is Internal Penetration Testing?

What is “Internal” Penetration Testing? In the video below, Mike continues his video series on penetration testing services comparisons, and defines Internal Penetration testing. He also compares it to the other types (i.e. external pen testing, social engineering, and physical

Read more ›

Penetration Testing Services Comparison: What is an External Pen Test?

What is an external pen test? In the video below, Mike continues his video series on penetration testing services comparisons… this time explaining an external pen test, and how it compares to the other 3 types. Want Mike’s recommendations on

Read more ›

Penetration Testing Services Comparison: Gray Box

When comparing penetration testing services, it’s important to understand gray box testing, and how it’s different from black and white box pen testing. In the video below, Mike explains white box penetration testing, comparing it to white and black box.

Read more ›