by Tony Asher | Jun 26, 2019 | Blogs
Security testing developer applications Do you have an application that was developed to purchased and you’re wrestling with whether to pay for it to be security tested or not? So when should you penetration test an application? You should pen test an...
by Tony Asher | Jun 26, 2019 | Blogs
A Security incident handling and response plan is a premeditated plan on how you will determine, classify, and respond in an organized and prepared manner to a cyber attack that potentially impacts the business. Your goal is to reduce the impact of the incident...
by Tony Asher | Jun 25, 2019 | Blogs
Do you development software or applications internally? Photo by Émile Perron on Unsplash Support for internally developed applications can allow speed to market, customization, and even a competitive advantage. Common problems are supportability, security, and...
by Tony Asher | Jun 11, 2019 | Blogs
When we consider the volume of security incidents and breaches we can see a picture that a large volume of these is hitting the endpoint. The reason is twofold; 1. Where the weakest link is = the user. 2. Administrative Rights – That asset is typically logged in...
by Tony Asher | Jun 6, 2019 | Blogs
What is a Minnesota cybersecurity advisor? A partner to come along aside you and your organization to help formulate the most right plan to lower risk and save money for your business. The threats are overwhelming. From access privilege escalation to cross-site...
Recent Comments