Category: Miscellaneous

Information Security Strategy, Part 1

The Problems of Security Testing and Unmanageable Reports

I’d like to talk a little bit about security testing, the problem of information overload and issue prioritisation. To do this I intend on broadly discussing some of the problems of the various options for security testing that organisations have.

I’ve written about some related things before, if you’d like a warm up:

However, I’d like to look a little at security a little more strategically today and to discuss the wider problems with security testing. To centre around the idea that, there are three main problems with the way companies approach security testing:

Continue reading: Information Security Strategy, Part 1

An Introduction to PenTesting Azure

Introduction

I recently wrote an introduction to cloud computing, and an introduction to PenTesting an AWS Environment. A sensible place to start given that I included that in Q1 of 2018 Amazon holds a 33% market share in cloud whereas Microsoft only holds 13%. However I did want to add a few notes that are specific to PenTesting within Azure environments here.

Continue reading: An Introduction to PenTesting Azure

An Introduction to Cloud Computing: Many Clouds in the Sky

A couple of days ago, I posted an article about Penetration Testing within AWS. I made comment on the different kinds of testing within this kind of environment however I didn’t add much detail regarding the kinds of environments – as I was speaking specifically of AWS.

So I decided to break things down a little further:

Part 1. An Introduction to Cloud Computing (you are here)

Part 2.  An Introduction to Penetration Testing AWS: Same Same, but Different

Part 3. An Introduction to PenTesting Azure

 

I’m going to do a short piece here to discuss a little more about the concepts of cloud itself, for those who haven’t made the jump. What is cloud computing? Microsoft neatly defines it as “the delivery of computing services over the Internet, typically charged based on usage.” Whereas Amazon words it as: on-demand delivery of IT resources via the internet with pay-as-you-go pricing.

Continue reading: An Introduction to Cloud Computing: Many Clouds in the Sky

An Introduction to Penetration Testing AWS: Same Same, but Different

Introduction

When penetration testing Amazon Web Services (AWS) environments there are different perspectives the assessment could consider, some are very similar to external infrastructure/web application assessments and some are different.

I’ll separate the things that are the same from the things that are different to traditional penetration testing by considering the following types of cloud testing and then breaking each one down into the kinds of testing that could take place:

Continue reading: An Introduction to Penetration Testing AWS: Same Same, but Different

Equifax Breach Timeline

Summary

In 2017 Equifax were breached, the breach was discovered on July 29[5] and an announcement was published on Sept 7.[5] It wasn’t the largest breach of all time, and not even of 2017, but it was big and the data was sensitive. Over the two weeks following the announcement, Equifax stock fell from 142.72 to 92.98 (34.58%)

Continue reading: Equifax Breach Timeline