PEN Consultants Logo
Don’t Be a Victim: Find your weaknesses before the criminals do. PEN Consultants can help!

Blog

2024-04-23

SMB Signing

The book of John says a good shepherd knows his sheep and his sheep know him. In cybersecurity, SMB Signing is similar to the shepherd-sheep relationship by verifying the identity of those connecting to your network shares, thus preventing Information Disclosure, MiTM attacks, spoofing, replay, data corruption, and more! SMB signing, present in the Server […]

2024-04-21

DMARC

When was the last time you reviewed your email security settings? If you are like most people, it probably isn’t recently. And yet, if not properly configured, an attacker could potentially spoof your email domain and send email messages to employees, or even clients, that appear to be coming from your email service! One configuration […]

2024-04-17

Unique Experience

Our unique approach sets us apart - former NSA experts on every engagement ensuring quality, compliance, and unparalleled results. See why our clients continue to choose us after experiencing our superior quality. Source: https://www.youtube.com/watch?v=B5S2Df7SPeM VIDEO TRANSCRIPT INTERVIEWER QUESTION:What specifically makes you unique compared to other firms in terms of experience?ROBERT:Well, with our Nation-state-level hacker experience…It’s […]

2024-04-15

Stay Alert: Insights from Ancient Wisdom

Peter's wisdom from 62 AD still resonates today: Stay alert, for the adversary is always seeking to devour. In cybersecurity, monitoring and responding to alerts is crucial to catching attackers and preventing data breaches. No organization is fully secure from all attackers. A persistent and/or advanced attacker WILL breach your systems if they decide to […]

2024-04-11

Breaching a Network With Risk-Accepted Vulnerabilities - ICS2 Alamo Chapter Meeting - April 2024

It was an honor to be invited to speak at the ICS2 Alamo Chapter Meeting this month! For those that missed it, here is a version of the presentation. Topic: Breaching a Network With Risk-Accepted Vulnerabilities

2024-04-09

Security Vendor Priorities

Wondering if your cybersecurity provider puts your security first? Ask for a list of dropped vendors due to security flaws. Their response will speak volumes about their priorities!

2024-04-06

Unique to PEN Consultants - Summary

Discover a new standard in offensive security! This video highlights PEN Consultants' Experience, Transparency, and Values - all of which make us unique. Source: https://www.youtube.com/watch?v=lZCmRKtIHaU VIDEO TRANSCRIPT

2024-04-03

Timely Patch Management

Don't underestimate the risks of known vulnerabilities. They could have extreme consequences, including, but not limited to, defacement of content, serious brand reputation issues, inclusion of malware and links to malware, ransomware, data breaches, etc. Example patch time policies: It is understood that patching, on occasion, can have unintended availability side effects. Nevertheless, it is […]

2024-03-28

Company Background & History

Check out the story of our founder's journey from NSA hacker to pioneering a cutting-edge offensive security & pentesting company! Source: https://www.youtube.com/watch?v=GeXKDWkVfSc VIDEO TRANSCRIPT

2024-03-25

King Solomon and Authentication Security

King Solomon said, "A cord of 3 strands is not easily broken." In cybersecurity, authentication using an unpredictable username convention, strong password policy, and securely configured MFA cannot easily be compromised. Usernames: Password Policy: MFA: Featured image is a derivative work from the following images: https://pixabay.com/photos/rope-knot-string-strength-cordage-3052477/

1 2 3 8
magnifiercrosschevron-down