Security awareness assessments are an effective means of gauging your employees susceptibility to clicking on suspicious links or engaging in less-than-ideal actions when it comes to handling received emails. While Maltek Solutions provides Security Awareness assessments, not every organization may have the budget to enlist an external resource. If you
Contents * Description * Classification * Examples * Remediation * References Description Applications and environments are often only as secure as their weakest user account password. To prevent initial compromise from occurring through account takeover, it is common to enforce complexity, length, and renewal requirements for passwords across an application or network. When these requirements
We have been working closely with APIsec University and are excited to announce the release of the API Security Certified Professional (ASCP) examination. The ASCP exam is a practical, hands-on evaluation designed to test a participant's knowledge of API security vulnerabilities by identifying and exploiting weaknesses in the exam applications.
Contents * Description * Classification * Examples * Remediation * References Description User Enumeration occurs on web applications when there are discrepancies in responses received from the application when sending a valid versus invalid username. User enumeration is typically found in authentication and password reset processes. When an authentication attempt on a web application fails,
Previously, we discussed the process of creating a Threat Map to identify ways in which attackers may target your organization and what you can do to begin mitigating those threats. The next step in your security journey is to conduct a Vulnerability Assessment. This process is an essential part of
While businesses are ever more connected to the outside world, they also face an increasing threat of cyberattacks. At the same time, IT security teams are under pressure to provide better protection while spending less on it. To meet these challenges, companies must move beyond perimeter-based security and look at