720-891-1663

Have You Adjusted Your Penetration Testing Strategy for the Cloud?

Hackers are targeting the cloud. Why? To paraphrase Willie Sutton, because that is where the data is. Historically, penetration testers gain access to network devices through the “perimeter defense” and then they move around (the so-called east-west movement) trying to get access to data, wherever it lives inside the network perimeter. But in the cloud, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Stewart International Airport Data Breach Self Inflicted

Stewart  International Airport has a long history.   In 1930 Thomas Stewart convinced his Uncle to donate land for an airport to the city.  In 1939 the U.S. Military Academy at West Point  built the first airfield at Stewart and in 1948 it became Stewart Air Force Base.  In 1970 the State of New York bought […]

Continue reading → [DISPLAY_ACURAX_ICONS]

PCI Council Releases New Version of Payment Card Security Standard

The PCI Council normally releases a new version of the standard which governs merchants that accept credit cards once every three years.  Given that version 3.0 came out in January, everybody thought they were safe for a while.  Version 3.1 was released today and even though merchants have 14 months to become compliant, there is […]

Continue reading → [DISPLAY_ACURAX_ICONS]