Compass IT Compliance Blog / Penetration Testing (3)

Government Cyber Weaknesses & the Need for White Hats

hacker-1569744_1920

Have White Hat, Will Travel “A young boy, with greasy blonde hair, sitting in a dark room…[T]he weary system cracker telnets to the next faceless .mil site on his hit list.”

Read Story

PCI Compliance - PCI DSS 3.2 By the Numbers

A keyhole within a line of code

PCI DSS 3.2 is coming and that means some changes for Merchants and Service Providers and the steps that they take to mitigate their risk of a breach involving credit and debit cards. While change is inevitable, change can still be difficult,especially when you are talking about all o …

Read Story

The SANS Top 20, A Vulnerability Assessment, and Penetration Testing

The SANS Top 20, A Vulnerability Assessment, and Penetration Testing

The SANS Top 20 Critical Security Controls outline the 20 most critical controls that an organization should implement to ultimately reduce their overall risk of suffering a data breach. These controls were originally developed in 2008 by the NSA at the request of the Office of the Se …

Read Story

IT Risk Assessments and the SANS Top 20

IT Risk Assessments and the SANS Top 20

No matter what industry you are in, conducting a thorough IT Risk Assessment is critical to your organization for a number of reasons. First, it gives you a point in time measurement of how your IT Security posture compares to either various regulations or IT Security Frameworks.

Read Story

The Best Cyber Monday Gift: A Security Risk Assessment

The Best Cyber Monday Gift: A Security Risk Assessment

Cyber Monday is in the books for 2015 and it is expected to be another record year for online spending. Analysts expect that individuals will spend around $2.4 billion online this past Cyber Monday, an 18% - 20% increase over last year. While there were some deals to be found out ther …

Read Story

Difference Between Vulnerability Scanning & Penetration Testing

Vulnerability Scanning vs Penetration Testing

As an IT Security Auditor with Compass IT Compliance over the past few years, I have had the privilege of engaging with a diverse range of individuals, from Boston to Los Angeles, and many places in between. A question that comes up frequently is about the distinction between vulnerab …

Read Story

Subscribe by email