• info@bluelightllc.com
  • 919-436-4170
  • Contact Us
Blue Light LLC
  • Home
  • About Us
    • History of the Blue Light Name
  • Blue Fusion
  • Training
    • Customized Training
    • Instructor Led Training
  • Services & Support
    • i2 Engineering and Consulting Services
    • i2 Technical Support
  • Partner Program
    • Current Partners
    • Partner Program Application
    • Partner Portal
Select Page

Are You Properly Testing Your Web Application Security?

by Don Fried

According to a report from Imperva, the number of new web application vulnerabilities disclosed in 2017 increased 212% over the previous year, jumping to 14,082 from 6,615. In addition, the […]

read more

3 Ways To Protect Your Applications From Authentication Bypass Attacks

by Don Fried

An authentication bypass attack could allow a hacker to steal sensitive data, compromise your server and even take control of site administration. Are you doing enough to protect your applications […]

read more

Are You Including Cross-Origin Resource Sharing (CORS) In Your Web Application Security Tests?

by Don Fried

While cross-origin resource sharing (CORS) is a great way to enable open access across domain boundaries, it’s critical to test CORS requests as part of your web application security protocols. […]

read more

Fix Cross-Site Scripting And Improve Web Application Security

by Don Fried

Cross-site scripting can severely compromise your network security and your company reputation. The most severe XSS (cross-site scripting) attacks allow an attacker to hijack your website visitors’ sessions and take […]

read more

MainNerve Featured in Colorado Springs Business Journal

by Don Fried

MainNerve’s Chief Security Officer, James Garcia, recently shared with the media the importance of penetration tests to thwart social engineering attempts. These white hat hacking methods are the bread and […]

read more

How Kmart Could Have Prevented Its Credit Card System Security Breach

by Don Fried

The recent news about a security breach involving unauthorized credit card activity at Kmart stores serves as a good reminder for businesses to set up in-depth security layering. According to […]

read more

The Wannacry Infection….not a problem if you practice cyber hygiene.

by Don Fried

I am sure that, over the weekend, you were inundated with news about the latest worldwide cyber attack, infecting hundreds of thousands of systems around the world. Once the infection […]

read more

Cybersecurity Grinches and Holiday Scammers Present: The 12 Scams of Christmas

by Don Fried

‘Tis the season of holiday scams! It’s a sad reality, really… that every year crooks take advantage of the holiday season—using fake websites, emails, and other nasty tricks of their […]

read more

The Democratic National Committee Hack: Lessons for Businesses Small and Large

by Don Fried

The recently well-timed release of thousands of emails from DNC servers during the national convention by Wikileaks displayed demonstrates the potential disaster that awaits companies and organizations that do not […]

read more

Local Cyber Expert Wins 2016 Sharkfest Packet Challenge Competition

by Don Fried

Colorado Springs, Colo. (July 14, 2016) – Jonathon Ford, longtime Colorado Springs resident and penetration tester, competed against 100 other entrants to win the title at the 2016 Sharkfest Wireshark […]

read more
« Older Entries
Next Entries »