Posts Tagged 'Foundstone'
Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can play a key role in […]
Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]
This is part III in a series on proactive defense using a proven professional services security methodology As I was watching the Cowboys and the Packers fight it out in the NFL playoffs a few weeks ago, I found myself thinking about the mindset of the coaching staff as certain plays were called and executed. […]
This is part II in a series on proactive defense using a proven professional services security methodology To me, the human body is a miracle and a mystery. But, I often think the same thing about the growing complexity of enterprise networks and the security solutions that are intertwined throughout them like our delicate circulatory […]
This is part I in a series on proactive defense using a proven professional services security methodology When my credit card got declined at the gas station I remembered a term I’d recently read in an article about a large retailer’s data breach. The term is “vulnerability-fatigue,” where news of a recent disaster is ignored […]