by Terence Martin | May 16, 2023 | Compliance, cybersecurity, penetration testing
Open source intelligence gathering, or OSINT, can be a threat to organizations because it can be used to gather information about their employees, assets, and vulnerabilities. This information can then be used to launch targeted scanning against discovered...
by Andrew Nash | Apr 4, 2023 | Compliance, cybersecurity, penetration testing
Overview One of the most common findings we make at Contextual Security Solutions during internal penetration tests is the presence of vulnerable network protocols, like Link-local Multicast Name Resolution (LLMNR), Web Proxy Auto-Discovery (WPAD)...
by Andrew Nash | Aug 3, 2022 | cybersecurity, penetration testing, Uncategorized
“Hacking” isn’t magic, but sometimes it is presented that way. Much of penetration testing and “hacking” is learning the tools of the trade and how they work “under the hood.” In this series we hope to provide a high-level overview of common...
by Kevin Thomas | Jul 20, 2020 | Uncategorized
We look forward to announcing the topic and date for the Q3 2020 Infosec Quarterly Quorum (IQ2) soon. As always the focus of our IQ2’s is to present and discuss current events and trends in the realm of information security and compliance. The presentations are...
by Kevin Thomas | Jul 16, 2020 | Uncategorized
Is your organization required to have an Annual Penetration Test? Are you currently evaluating vendors or want to know more about the Contextual Security Solutions approach? If so, reach out to our team today for a copy of the “What’s in the Pen...
Recent Comments