Contextual Security
  • About Us
    • Our Team
    • Careers
  • Services
    • BASE (Base Assessment of Security Elements)
    • Penetration Testing
    • PCI Compliance
    • Cybersecurity Maturity Model Certification (CMMC)
    • HIPAA Risk Assessment
    • General Data Protection Regulation
    • CIS Top 20
    • SecurityXtension
    • Rogue Access Point (AP)
    • HITRUST
    • Types of Pen Testing
  • Specialty Industries
    • Retail
    • Healthcare
    • Power
    • Finance
  • Blog
  • Contact Us
  • (844)-526-6732
  • Let’s Chat
Select Page

The Need for Incident Response Playbooks

by Kevin Thomas | Jun 17, 2022 | cybersecurity, incident response

The most recent Cost of a Data Breach Report (Ponemon 2021) found that “Lost Business Cost” represented the largest percentage (38%, or $1.59M) of the $4.2M average cost of a data breach. One of the key contributors to the “Lost Business Cost”, along with the cost of...
Why are you asking to be Whitelisted?

Why are you asking to be Whitelisted?

by Slade Griffin | Oct 23, 2020 | cybersecurity, penetration testing, whitelisting

Recently I have been asked by clients why we request that our scans be whitelisted when we are performing external security assessments. Many people believe that a blocked scan is the same as blocking a vulnerability which is present on a host. This could not be...

Recent Posts

  • The Need for Incident Response Playbooks
  • 0-Day
  • False Positives / What Are They Doing Here?
  • Visibility and “Actionable” Metrics / #ExpectMore Series
  • Security Assessments & Security Debt / #ExpectMore Series

Recent Comments

    Archives

    • June 2022
    • March 2022
    • December 2021
    • November 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • April 2020
    • March 2020
    • February 2020

    Categories

    • cybersecurity
    • incident response
    • penetration testing
    • Uncategorized
    • whitelisting

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    Visibility and “Actionable” Metrics / #ExpectMore Series

    by Slade Griffin | Dec 7, 2021 | Uncategorized

    Continuing with our #ExpectMore series, I want to explore some commonly used terms and what they might look like during a penetration test in your environment. “Visibility”, “Actionable Metrics”, these terms are frequently used in the cybersecurity world by vendors...

    Security Assessments & Security Debt / #ExpectMore Series

    by Kevin Thomas | Nov 18, 2021 | Uncategorized

    At Contextual Security Solutions we are continuously looking for ways in which we can better serve our customers. It has been a primary focus from day one, almost ten years ago. Whether it’s through the creation of our illumino Compliance...

    Why Every Organization Needs a Sufficient Incident Response Plan

    by Richard G. | Apr 13, 2021 | Uncategorized

    Organizations across all sectors rely on technology to run their businesses. It is a vital component that is necessary to handle nearly every aspect of the day-to-day workings of any business. With the presence of this technological integration comes the risk of...

    « Older Entries
    Next Entries »

    Contextual Security
    5100 Poplar Avenue, 27th Floor
    Memphis, TN 38137
    844-526-6732
    info@contextualsecurity.com

    Let’s have a chat. We will call you right back!

    7 + 5 =

    Solid security begins with knowing. Excels by doing.

    • Home
    • Services
    • Industries
    • SecurityXtension
    • Resources
    • Contact Us
    • (844) 526-6732

    copyright 2020 | Contextual Security

    • Follow
    • Follow