by Don Fried | May 11, 2020 | Application, Network, Wireless
Conducting pen tests might seem easy enough, with the right tools and some YouTube videos. Sure, you can do the test yourself, but here’s why you shouldn’t. Pen test certifications Pen testers should have certifications that show they know what they are...
by Don Fried | Apr 27, 2020 | Application, Compliance, Network, News
In speaking with many of our clients, MainNerve’s staff has fielded countless questions about the type of penetration testing and approach that will be used, such as black box testing. Often, clients are uncertain of what they are needing for their business, so...
by Don Fried | Mar 17, 2020 | Network
Coronavirus and Cybersecurity Attacks: What You Need to Know Coronavirus is here and cybersecurity attacks are on the rise! Here’s what you need to know about the latest scammer attacks, and how you can prevent you or...
by Don Fried | Jan 24, 2020 | Network
What is Cybersecurity? Cybersecurity is the process of protecting networks, applications, and devices from cyber-attacks or malicious hackers. These attacks are used by malicious hackers to access or destroy sensitive information, data, or even hold this data...
by Don Fried | Jun 15, 2019 | Network
Besides cost, there are many differences between penetration testing and vulnerability scanning or assessments. Based on NIST SP 800-115, Technical Guide to Information Security Testing and Assessment, penetration testing is “Security testing in which...
by Don Fried | Jun 7, 2019 | Compliance, Network
If you are a defense contractor, you have probably been deluged with all kinds of emails promising the end of your business and ability to work with the US Government as a Prime Contractor or subcontractor if you don’t conform to the new DFARS clause (DFARS...
by Don Fried | May 23, 2017 | Breaches, Network
I am sure that, over the weekend, you were inundated with news about the latest worldwide cyber attack, infecting hundreds of thousands of systems around the world. Once the infection was uploaded, the files in the affected computers and servers were then encrypted...