SEVN-X Blog
A Blog for Nerds
Featured Post
PCI DSS: What It Is and What It Isn't
What PCI Isn't Let’s dig in. PCI is not easy, but it can be made significantly easier with the right configuration and t...
Stay Steps Ahead With Assumed Breach Testing
What's The Big Deal Assumed Breach Penetration Testing is intended to emulate an attacker that has already achieved a le...
To SAST, or to DAST, That is the Question
While implementing secure coding guidelines, enforcing strict code review processes, providing our developers the necess...
Deconstructing The Penetration Test
All Pen Tests are Not Created Equal As a security professional (who in full disclosure is not a penetration tester), I f...
Massive Account Takeover @Twitter
The Video What Happened? Hackers targeted Twitter to compromise some of the country’s most prominent figures including f...
Does Your Office Miss You?
The New Normal It's no surprise that we live in a digital age. Particularly in this COVID era—where the majority of the ...
The Great Security Race
Why is a comparison to other, similar organizations so sought after? Is it comforting? All too often this information is...