SecureState Information Security Blog
Thursday, January 12, 2012

SecureState Has A New Blog - Come See What You're Missing!

›
Don't forget to check out SecureState's new blog site  - we recently released a new tool update, take a look here  and while you’re ...
Friday, June 3, 2011

SecureState Releases New Tool for Footprinting 802.1x Wireless Networks

›
Today, SecureState is releasing a new tool for footprinting 802.1x wireless networks called EAPeak. EAPeak is a Python powered script that i...
Saturday, May 14, 2011

But My Web Application Uses SSL...Of Course I’m Secure

›
SecureState Auditor: What are you doing for web application security? Web Development Project Lead: We use SSL. The Setup: How You Protect...
Thursday, May 5, 2011

Quit Hoarding

›
Evaluate your security program’s maturity before dropping money on a quick-fix “hot” product. Evidently, there is an increasing fascinatio...

Information Policies & Procedures, Part 7

›
This is part of an ongoing series on documentation development. Do words matter? Of course they do. There are few places where this state...
Thursday, April 21, 2011

“We Have a Vulnerability Management Program…It’s in Our Data Center”

›
From Running Scans to Building a Vulnerability Management Program I perform the Vulnerability Assessments and Payment Card Industry Approv...
Tuesday, April 19, 2011

Spring into a New Career!

›
SecureState will be holding on-site open interviews on Thursday, April 21 from noon to 6:30 p.m. at the SecureState Headquarters: 23340 Mi...
›
Home
View web version

Contributors

  • Chris Clymer
  • David Sopata
  • Drayton Graham
  • Gary McCully
  • Ken Stasiak
  • Marketing
  • Matt Franko
  • Matt Neely
  • SecureState
  • Stephen Marchewitz
Powered by Blogger.