Cybersecurity Assessments | Penetration Testing
By:
Rene Guerra
October 4th, 2022
If you’re running a business online, you’re likely providing an application program interface (API) on your website that allows your customers or business partners to enter and retrieve data. At Schellman, we primarily see REST-based APIs, but we’ve also tested GraphQL and occasionally SOAP.
Cybersecurity Assessments | Penetration Testing
By:
Josh Tomkiel
August 4th, 2022
Famous detectives throughout history have always been thrown into cases. That’s the nature of their job—the situation to create the case occurred, and it’s up to Sherlock Holmes to follow a trail of clues to determine the solution. When you perform an internal network pen test, the nature of the work is similar, but there are a few things you can do to help these cyber “detectives” maximize your knowledge gained and action items moving forward. Schellman’s Pen Test Team is experienced, and we often get asked to perform this specific type of evaluation. Having gone into these sorts of engagements many times before, we want to share some helpful insight specific to this kind of test.
By:
JORDAN HICKS
June 8th, 2022
If you remember Larry King, you might know that during his time at CNN he became a legendary interviewer, having spoken with politicians, celebrities, athletes, and royalty all during his tenure.
By:
Schellman
June 1st, 2022
In the hit song, Sweet Dreams (Are Made of This), Eurythmics produced a bop that encourages everyone to stay optimistic and to keep working towards their goals.
Cybersecurity Assessments | Cloud Computing
By:
KRISTEN WILBUR
May 11th, 2022
It was once remarked that “there are no rules of architecture for a castle in the clouds.”
By:
Schellman
April 20th, 2022
FIDO Says Look to Authentication Alternatives. Stop me if you’ve heard this before:
By:
BRYAN HARPER
March 29th, 2022
A while ago, we posed this question, “Do You Need a Ransomware Preparedness Assessment?”