• Threat Intel RSS Feeds via Twitter Lists

    Many security researchers take time to publish their scripts, tips, successes, and failures on Twitter for all to see. As a security professional, it’s important to learn how to effectively use Twitter so you don’t miss anything, but how do you manage to sift through everything? Check out this post on how to turn your Twitter Lists into manageable RSS feeds so you can stay on top of what’s important to you!

  • Search Breach Data Quicker with AWS Athena

    Most password breach files are organized by user account, but it can be beneficial to search by domain name instead. That can take far too long for massive breach files, so check out this post that shows you how to harness the power of AWS Athena to quickly find the data you need for your next penetration test!

  • Web Assessment Testing Configuration

    My standard testing process takes some a little work upfront, but I’ve found it’s easy to work with after the initial setup and is the most efficient way for me to manage different projects. First off, I typically funnel my traffic through a single egress point. Depending on the project, that might be a Kali box deployed at a client site, in a cloud instance, in my office lab, or even locally.

Big Breaks Come From Small Fractures.

You might not know how at-risk your security posture is until somebody breaks in . . . and the consequences of a break in could be big. Don't let small fractures in your security protocols lead to a breach. We'll act like a hacker and confirm where you're most vulnerable. As your adversarial allies, we'll work with you to proactively protect your assets. Schedule a consultation with our Principal Security Consultant to discuss your project goals today.