SEVN-X Blog
A Blog for Nerds
Featured Post
Security Tools Are Not a Security Program
Author: Matt Wilson TL;DR Buying security tools doesn’t make you secure. Tools support a security program, but they don’...
Security Fatigue is Real: How to Fight It
Author: Matt Wilson Introduction People aren’t the weakest link, they’re the most fatigued one. Between endless alerts, ...
Ghost Tapping
Matt Barnett sits down with NBC10 to talk about "ghost tapping," a new scam targeting those using contactless payment wh...
Security Starts Here: Foundational Controls Every Organization Needs
AuthorS: ERIC BUCK | RYAN BRADBURY Introduction Security doesn't begin with advanced threat hunting or sophisticated pen...
Beyond the Click: Why Phishing Defense Needs More Than Awareness Training
AUTHOR: SIARHEI STARASVETSKI Let's face it — phishing is still the go-to method for breaking into companies. Depending o...
What Makes a 'Good' Security Vendor?
AUTHOR: MATT WILSON Whether you’re a small business working through a client security requirement or an IT leader trying...
Your First Security Assessment: What to Expect
AUTHOR: MATT WILSON It's time for your first (or first in some time) security assessment…so what exactly happens? First...
Phishing: Not Just a User Problem
AUTHOR: MATT WILSON Yes, users click things, they always have, and (probably, maybe) always will. However, approaching p...
Password Spraying Optimization
AUTHOR: SIARHEI STARASVETSKI Introduction Password spraying has long been a staple technique in penetration testing and ...
PCI Compliance Cheat Code
Author: Steve Foret The complexity of achieving and remaining compliant against a very articulated security framework is...