Current Topics and Information

Focused on the ever-changing information security landscape

Sub-header Photo

ACCUVANT BLOG

What Does a Risk Assessment Do For Your Organization?

The purpose of a risk assessment is two-fold: to identify the threats that an organization faces and to help determine how to best prioritize resources to address those threats and protects its assets. When it comes to information assets, three things are critical: • The confidentiality of the information • The integrity of the information • The availability of [...] Read more

Read more

The Hawthorne Effect of Penetration Testing

Back in the 1920s, there was a study done to test room illumination and its effects on the productivity of workers. What the testers expected to see was the level of illumination at which the work was optimal. What came out of the research, however, was something quite interesting. No matter what level of illumination, [...] Read more

Read more

Staying Safe at Work

It’s common practice to lock the doors at home each night; in fact most people do it without even thinking about it. But what about at work; do you “lock” the doors each day? If you and your workforce are using simple passwords, blindly clicking on pop-ups or suspicious links, or are lacking proper network [...] Read more

Read more

What Triggers Insider Threat?

When asked, “Do you have an insider threat problem?” many organizations might conclude that they have no issues and nothing to worry about, others admit they have a problem with no strategy. Both responses are inadequate. Insider threat can happen at any organization within any industry. Knowing this, is your organization taking the proper precautions [...] Read more

Read more

Getting Ready for a Pen Test: Step 3

In the first blog post of our three-part penetration (pen) test series, we discussed the five common ways an attacker can gain access to your corporate network that you should address immediately before bringing in a penetration tester. In the second blog post, we discussed taking inventory of systems, assets and critical data on your [...] Read more

Read more

Getting Ready for a Pen Test: Step 2

In the first blog post of our three-part pen test series, we discussed the five common ways an attacker can gain access to your corporate network that you should address immediately before bringing in a pen tester. The next critical step focuses on asset identification and network segmentation. During this process, it’s important to take inventory [...] Read more

Read more

Getting Ready for a Pen Test: Step 1

The mainstream media coverage of the recent Heartbleed Bug certainly caught the attention of people around the world. More consumers quickly discovered how easily their personal and confidential data could be stolen because of a long-overlooked security flaw. And businesses were scrambling to determine how this vulnerability could impact their corporate networks. This recent scare may [...] Read more

Read more

So Many Breaches…What’s Being Done?

It seems that every day we’re hearing news of a new vulnerability or breach that is compromising data. Will this ever end? Unfortunately, no – it’s the nature of security. Attackers will always try to acquire sensitive information, increasingly for financial gain. Many information security professionals are working behind the scenes to protect this data, but [...] Read more

Read more

Leveraging Policy and Procedure to Get the Most Out of Cyber Defense Technology

Why Policy and Procedure is Critical to Effective Technology Countermeasure Deployment Technology countermeasures have come a long way since the dawn of information technology security. Just over a decade ago, IT security technology could be loosely categorized into endpoint and network security. With these broad categories one would have covered the vast majority of technology countermeasures [...] Read more

Read more
(136 Results)