Contextual Security
  • About Us
    • Our Team
    • Careers
  • Services
    • BASE (Base Assessment of Security Elements)
    • Penetration Testing
    • PCI Compliance
    • Cybersecurity Maturity Model Certification (CMMC)
    • HIPAA Risk Assessment
    • General Data Protection Regulation
    • CIS Top 20
    • SecurityXtension
    • Rogue Access Point (AP)
    • HITRUST
    • Types of Pen Testing
  • Specialty Industries
    • Retail
    • Healthcare
    • Power
    • Finance
  • Blog
  • Contact Us
  • (844)-526-6732
  • Let’s Chat
Select Page
Catchphrase: Data Breach Edition

Catchphrase: Data Breach Edition

by Kevin Thomas | Sep 24, 2020 | Uncategorized

Take a minute and see if you can tell what the image is above based on only pieces of it being revealed.  Is it a dog? a bear? Or something else altogether. Back in the eighties there was a game show called CatchPhrase that me and my older sister  would watch from...

Recent Posts

  • PCI DSS 3.2.1 to 4.0 Control Changes – Requirement 2
  • PCI DSS 3.2.1 to 4.0 Control Changes
  • Don’t Deploy Vulnerabilities
  • BloodHound Basics
  • Exploiting the JMX Console (A slightly different path to compromise)

Recent Comments

    Archives

    • February 2023
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • March 2022
    • December 2021
    • November 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • April 2020
    • March 2020
    • February 2020

    Categories

    • Compliance
    • cybersecurity
    • incident response
    • PCI DSS 4.0
    • penetration testing
    • Uncategorized
    • whitelisting

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    BloodHound Basics

    by Andrew Nash | Aug 3, 2022 | cybersecurity, penetration testing, Uncategorized

    “Hacking” isn't magic, but sometimes it is presented that way. Much of penetration testing and “hacking” is learning the tools of the trade and how they work "under the hood." In this series we hope to provide a high-level overview of common offensive tools, how they...

    Exploiting the JMX Console (A slightly different path to compromise)

    by Terence Martin | Jul 19, 2022 | cybersecurity, penetration testing

    On a recent engagement, the client I was assessing had a relatively strong security posture. None of the old standby attacks were working. The client had disabled LLMNR and WPAD based on a previous security assessment, and all the client’s Windows machines were...

    PCI DSS 4.0 Timeline

    by Joshua Jones | Jul 8, 2022 | Compliance, PCI DSS 4.0

    March 2022 forever changed the compliance landscape for all time. PCI DSS 4.0 was launched, the world was ushered into an era of bliss. Ok, seriously, bliss and compliance frameworks are, for most, not even in the same solar system. But, PCI DSS 4.0 is here and, for...

    « Older Entries
    Next Entries »

    Contextual Security
    5100 Poplar Avenue, 27th Floor
    Memphis, TN 38137
    844-526-6732
    [email protected]

    Let’s have a chat. We will call you right back!

    15 + 5 =

    Solid security begins with knowing. Excels by doing.

    • Home
    • Services
    • Industries
    • SecurityXtension
    • Resources
    • Contact Us
    • (844) 526-6732

    copyright 2020 | Contextual Security

    • Follow
    • Follow