You’re ready to schedule your penetration test, but aren’t sure when that should be. Should it be at the beginning of the year or the end of the year? Are there industry standards that apply to scheduling your test? In this video, we take a…
There are a lot of companies selling penetration tests (pen tests), but how do you know if what you are getting is a real pen test? When it’s something that’s less tangible than, say, getting an oil change, it can be hard to determine if…
The Log4j vulnerability has been in the news since its discovery in November 2021. At MainNerve, the most common question asked is, “Does MainNerve test for the Log4j vulnerability?” The answer is yes, but what is this vulnerability, and why does it matter so much? …
If you think the Rules of Engagement sound like a war movie, you’re not alone. In the penetration testing world, it’s more about cyber warfare, indirectly. What is it? Proactive penetration testing can help combat would-be attackers by identifying vulnerabilities before they do. The Rules…
Conducting pen tests might seem easy enough with the right tools and some YouTube videos. Sure, you can do the test yourself, but here’s why you shouldn’t. Pen test certifications Pen testers should have certifications that show they know what they are doing. These certifications…
In speaking with many of our clients, MainNerve’s staff has fielded countless questions about the type of penetration testing and approach that will be used, such as black box testing. Often, clients are uncertain of what they need for their business. We work with them…
Coronavirus and Cybersecurity Attacks: What You Need to Know
Coronavirus is here a,nd cybersecurity attacks are on the rise! Here’s what you need to know about the latest scammer attacks and how you can prevent yourself or your company from being a pawn in this game. Check Point cybersecurity reported that over 4,000 coronavirus-related…
What is Cybersecurity? Cybersecurity is the process of protecting networks, applications, and devices from cyber-attacks or malicious hackers. Malicious hackers use these attacks to access or destroy sensitive information, data, or even hold this data for ransom. Why is Cybersecurity Important? Everyone and everything are…
There are many differences between penetration testing and vulnerability scanning or assessments. Based on NIST SP 800-115, Technical Guide to Information Security Testing and Assessment, Penetration Testing is “Security testing in which evaluators mimic real-world attacks in an attempt to identify ways to circumvent the security…
DFARS and Cybersecurity: What Defense Contractors Need to Do
If you are a defense contractor, you have probably been deluged with all kinds of emails promising the end of your business and ability to work with the US Government as a Prime Contractor or subcontractor if you don’t conform to the new DFARS clause…