Cybersecurity Whitepapers

NetSPI is proud to be an industry thought leader contributing to the infosec community with our ongoing security research.

The Benefits to Developing a Vulnerability Management Program

Vulnerability Management is a core information security discipline into which every organization should be investing substantial time and resources…

Penetration Testing: Clarifying a Commonly Misunderstood Security Discipline

All organizations should aspire to have the right people, processes and tools in place to effectively execute an on-going penetration testing program…

Web Application Firewalls

As we all know, web sites continue to be a primary target for data breaches. A Verizon Data Breach Report tells us that in 80% of the data breaches a web…

The Dark Harvest – Active Directory Credentials on Mobile Devices

Since the advent of the Blackberry, mobile devices have had a place in most workplaces. Most users access their work email and calendars using Active Sync…

An Approach to Enterprise Vulnerability Management

Every day researchers and security testers uncover technical vulnerabilities that pose risks to the critical systems, processes, and data at organizations…

Going Mobile Without Going Nuclear

Today’s mobile devices are among the latest developments in a technology evolution that started over half a century ago. It one sense, it began with…

Dealing with Mobile Devices in a Corporate Environment

Mobile computing technology is hardly a recent phenomenon but, with the influx of mobile devices such as smartphones and tablet computers into the…

Hardening Critical Systems at Electrical Utilities

Securing our nation’s critical power infrastructure and assuring a dependable electrical supply has never been more important.  Faced with…

Windows Vista – Ease of FULL SYSTEM Access

There is no doubt that Vista brought gobs of new security features to the Windows line of operating systems. However, in spite of all of its newly polished…

Common PCI Audit Mistakes

One auditor’s perspective on what it means to soundly meet the gray requirements which include firewall rulesets, system hardening, SDLC, penetration…

Why You Need an Incident Response Plan

It’s not yet 8:00 A.M on a Monday morning. One of the IT staff has just called, saying that the firewall audit logs and server connection logs…

Demystifying the Confusing Landscape of Healthcare IT Security and Compliance

The landscape of information security in healthcare is a complicated one. There are federal laws and regulations such as HIPAA to safeguard patient privacy,…

Fighting Multi-Vector Attacks with Multiple Scanning Tools

Threats to IT security keep evolving as criminals figure out new ways to steal valuable information. One of the more dangerous developments has been the…

Understanding the New HIPAA Rules

The American Recovery and Reinvestment Act (ARRA) includes a portion known as the Health Information Technology for Clinical and Economic Health Act…

Be Prepared – The Role of the FTC in Data Breaches

If you run or work in a business that keeps people’s Social Security numbers, addresses, and other personal information, and that information is lost or…

Encoded Automated SQL Injection Attacks

Millions of web pages are infected every year by SQL injection attacks. This paper gives you a brief overview of these types of attacks as well as their…

Close
888.270.0317 sales@netspi.com