Resources

NetSPI is proud to be an industry thought leader contributing to the infosec community with our ongoing security research.

How Do You Know You’re Covered in the Cloud?

The cloud is a valued part of modern infrastructure and there are more resources than ever to help you secure your cloud environment.

Intro to Cloud Penetration Testing for CISOs & Security Managers

Many companies’ cloud resources are unintentionally exposed to attackers, usually due to human error. Cybercriminals probe constantly for common security gaps on Azure, AWS, and other hosting services.

4 Reasons You Need Cloud Penetration Testing

If you use Microsoft Azure, Amazon Web Services or cloud services, you need cloud penetration testing. Learn about common cloud security gaps and the benefits of cloud penetration testing.

Penetration Testing: Clarifying a Commonly Misunderstood Security Discipline

All organizations should aspire to have the right people, processes and tools in place to effectively execute an on-going penetration testing program…

Web Application Firewalls

As we all know, web sites continue to be a primary target for data breaches. A Verizon Data Breach Report tells us that in 80% of the data breaches a web…

Dealing with Mobile Devices in a Corporate Environment

Mobile computing technology is hardly a recent phenomenon but, with the influx of mobile devices such as smartphones and tablet computers into the…

Hardening Critical Systems at Electrical Utilities

Securing our nation’s critical power infrastructure and assuring a dependable electrical supply has never been more important. Faced with…

Windows Vista – Ease of FULL SYSTEM Access

There is no doubt that Vista brought gobs of new security features to the Windows line of operating systems. However, in spite of all of its newly polished armor…

Why You Need an Incident Response Plan

It’s not yet 8:00 A.M on a Monday morning. One of the IT staff has just called, saying that the firewall audit logs and server connection logs…

Understanding the New HIPAA Rules

The American Recovery and Reinvestment Act (ARRA) includes a portion known as the Health Information Technology for Clinical and Economic Health Act…

Be Prepared – The Role of the FTC in Data Breaches

If you run or work in a business that keeps people’s Social Security numbers, addresses, and other personal information, and that information is lost or…

Web Application Penetration Testing Checklist

Website and web application attacks are a primary source for data breaches. While testing web applications, it is crucial to have a defined set of categories to consistently track and test.

NetSPI Resolve: Vulnerability Management & Orchestration Platform

Resolve automates, tracks, and orchestrates vulnerability management processes at every stage. Resolve correlates all your vulnerability data from across your organization into a single view, so you can discover, identify, and fix vulnerabilities faster, and reduce your risk exposure.


Contact Us