Blog

Our top industry experts weigh in on topics that could affect you and your organization

  • Did you Know InfoSec Assurance is Required in Automotive Product Testing?

    Posted on September 18, 2019 by Devesh Panchwagh

    If you are an automotive supplier or service provider, you may have enough to worry about to stay on track with product delivery goals. There are OEM demands and aggressive plans to speed time to market. And now, Information Security assurance is required in the Testing phase for Automotive products. Learn More
  • Reduce the headache of managing compliance by taking a programmatic approach

    Posted on September 1, 2019 by John McDonald

    Can you remember the last time you supported an audit or assessment? You may still have occasional nightmares about the process. It may have been a regulatory audit for something like HIPAA, PCI, NERC/FERC, or DFS 23 NYCRR 500. If there were only some way to simplify the process and make it less painful (and costly). Well, there is a way. Learn More
  • Demystifying ICS Cyber Risk with FAIR Analysis

    Posted on August 20, 2019 by John McDonald

    When it comes to cybersecurity, organizations that use Industrial Control Systems (ICS) tend to be at a disadvantage. There are unique factors that affect managing risk for such systems. 

    In this blogpost, find out what makes managing risk a slippery slope for Industrial Control Systems.  See how using FAIR methodology to quantify risk can help you pinpoint your biggest cybersecurity vulnerabilities — and spend budget intelligently. Learn More

  • A day in the life of a Pen Tester: how our Test Team infiltrated a client’s network

    Posted on August 13, 2019 by Charles Worrell

    As a pen tester, I’m only as good as the tools at my disposal, the team by my side, and the handy skills in my back pocket. When it came time to conduct a Red Team Assessment, my team and I needed to combine all our special skill sets to test our client’s defenses.

    The first thing we needed to do was to understand the client’s Internet footprint. This understanding would provide valuable intelligence for the rest of the engagement. Learn More

  • Tips on building a high-performance Security Team

    Posted on May 21, 2019 by John Fehan

    As the attack surface grows for Cybersecurity, if your IT Team is unable to keep up with the risks, there is more at stake than the success of your business. Did you know that these days IT Teams risk their mental health worrying about network security? In this blogpost, see how to build a happy high-performing Security Team. Learn More
  • Knowledge from the field: Steps to secure IoT products

    Posted on May 8, 2019 by Jon Lucero

    At our test lab for wireless products, we hear all kinds of testing showstoppers.  This is one of them:  sometimes we meet device manufacturers who have not taken into account the need to do security testing on their products until after they are fully designed and engineered to be produced. This oversight often results in unexpected and costly delays in getting a product to market. Learn More

Before you leave…
want to sign up for our newsletter?