penetration testing

Home/Tag: penetration testing

The Importance of Application Penetration Testing

Industry is slowly adapting to the need to test applications for security - especially those companies in regulated environments. But not all have adapted to this new paradigm. I'm sure Quest wishes they had a done a more thorough job of testing their mobile app (http://fortune.com/2016/12/13/quest-diagnostics-data-breach-health/) when 34,000 of their users had their personal information stolen... Ugh. The lack of proper testing is not just in the domain of industry however. Although most of us are never going to have [...]

Layer 8 Security Supporting Philadelphia Veterans at Union League’s Dining Out

PRESS RELEASE Contact: Casey Lipson, Sales and Marketing Coordinator casey.lipson@layer8cybersecurity.com December 11, 2015 Exton, Pennsylvania - Jeff Lipson, Executive Director of Layer 8 Security, and Dave Heilig, Software Solutions Director of Layer 8 Security, attended the annual Union League's Dining Out event at the Union League of Philadelphia. Proceeds from the event were donated to Philadelphia veterans. The guest of honor, pictured above with Jeff and Dave (left and right, respectively), was General Carter Ham, US Army (Ret). "It is an honor [...]

IoT can help manufacturing, but does it make you less secure?

When companies began to embrace the idea and the tech behind the Internet of Things (IoT), one area that stood to benefit the most was, and is, the world of manufacturing. Anyplace that relies on efficient operations to keep things flowing, and does so using a litany of systems, lends itself well to the burgeoning world of IoT. Imagine if all of your numerous systems are becoming much more easy to network and thus control online-it would be a godsend [...]

Prevention Trumps Detection

Some of you may see that headline and consider me Captain Obvious, but it's worth saying regardless. For as many IT staffers out there prefer to take the approach of threat prevention and avoidance, there are still plenty  that are content to detect and remedy. And that method has a major flaw-detection time. While some security appliances do provide real time, or near-real time threat detection and reporting, deployment of such tools is not as common as, say, a wireless [...]