Jun 2, 2020 | Cybersecurity, Podcast, REDSEC, Vulnerability Scanning
Podcast: Play in new window | DownloadSubscribe: Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreThis week we are welcoming Kyle to the podcast to tell us all about REDSEC. We’ll learn who they are and how they help clients find vulnerabilities...
May 14, 2020 | Cybersecurity, Penetration Testing, Podcast, Vulnerability Scanning
Podcast: Play in new window | DownloadSubscribe: Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreThis week we’re again joined by Eric and Randy to hear some war stories. Randy takes us through the time that he immediately accessed a bunch of...
May 7, 2020 | Case Study, Information Security, Podcast, Vendor Assessments, Vulnerability Scanning
Podcast: Play in new window | DownloadSubscribe: Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreWe live in a world where everything is connected to the internet, even fish tanks, and as we learn in today’s episode, that internet connected fish...
May 5, 2020 | Case Study, Compliance, Cybersecurity, Incident Response, Information Security, Podcast, Professional Services, Vulnerability Scanning
Podcast: Play in new window | DownloadSubscribe: Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreOn this week’s episode of Pwned, Justin and Zack are joined by Eric and Randy, two operators from our penetration testing team. This is another...
Jun 24, 2019 | Cybersecurity, Incident Response, Information Security, Podcast, Vulnerability Scanning
Podcast: Play in new window | DownloadSubscribe: Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreSponsor: https://nuharborsecurity.com Contact Me: https://justinfimlaid.com/contact-me/ Twitter: @justinfimlaid...
Jun 24, 2019 | Cybersecurity, Penetration Testing, Tenable, Vulnerability Scanning
By: Justin Fimlaid What is an Exim server? An Exim server is a mail transfer agent used on Linux like operating systems. Exim is a free software and used by as much as 57% of the Internet email servers. Over the past couple weeks it has been noted that a heavy amount...
Jun 10, 2019 | Cybersecurity, Penetration Testing, Vulnerability Scanning
By: Justin Fimlaid What is SHA-1 and what is the history of SHA-1? Originally SHA-1 was developed as part of a U.S. government capstone project. The first version of SHA was SHA-0 and that was developed in 1993 as the Secure Hash Standard. SHA-0 was originally...
May 13, 2019 | Professional Services, Tenable, Vulnerability Scanning
By: Justin Fimlaid Thinking about building a vulnerability management program? Unsure where to start? Unclear as to why your program might not be working? For some organizations, thinking about the end goal of the vulnerability management process can help provide...
Apr 29, 2019 | Cybersecurity, Tenable, Vulnerability Scanning
By: Justin Fimlaid Are you looking to build your vulnerability management program using Tenable’s products? If so, this is a quick start guide to get orientated with the Tenable.IO suite. What is Tenable IO? Tenable IO is Tenable’s cloud scanner or SaaS...
Apr 22, 2019 | Audit, Compliance, Cybersecurity, Tenable, Vulnerability Scanning
By: Justin Fimlaid Every organization has different needs related to their vulnerability management program. This varies from the scanner used (cloud or on premise), the places where sensors are deployed, the technology environment, and the needs of your vulnerability...