708-593-3516
Secure Compliance Solutions
  • Home
  • Services
    • Advisory
      • CMMC
      • Compliance Auditing
    • 24×7 Security Monitoring SIEM
    • Penetration Testing
    • Security Awareness Training
    • Vulnerability Assessment
  • Blog
  • About Us
  • Contact Us
Menu

    A Quick Linux Server Hardening Checklist

    2018-03-26 Blog, Security Tools, Tips, and Techniques by Mark Rudnitsky
    Read More

    GDPR for the Rest of Us

    2018-03-23 Blog, Compliance and Legal by Austin Songer

    In the days following the latest Facebook scandal, in which we learned that Cambridge Analytica collected and misused the personal data of potentially 50 million American Facebook users, we have seen: A large social media […]

    Read More

    GitHub Hit with Largest DDoS in History

    2018-03-20 Attacks, Blog by Mark Rudnitsky

    On February 28th, 2018, GitHub reported that it experienced the largest DDoS attack on record, with a maximum volume of 1.35Tbps. The GitHub Attack Process Many applications use a memory caching system called “memcached“. Administrators […]

    Read More

    Using Google Street View to Infer Population Demographics

    2018-03-19 Blog, Research by Mark Rudnitsky

    Researchers at Stanford recently published a paper exploring the harvesting of demographic information from an unlikely source: Google Street View. By using a method of deep learning called “Convolutional Neural Networks”, the researchers successfully determined […]

    Read More

    Extreme Weather, Cyber Attacks: Are You Ready?

    2018-03-16 Blog, Business Operations by Austin Songer

    Extreme Weather WILL happen. Cyber Attacks WILL happen. WILL You be Prepared WHEN they strike?? In this blog, I compare cyber threats and natural disasters to explain why a cybersecurity strategy is an important component […]

    Read More

    Recent Posts

    • Increasing Security through Network Segmentation
    • How to Prevent Ransomware
    • Best Practice in Security Layers
    • Vulnerability Scanning Vs. Penetration Testing
    • What is Penetration Testing?

    Recent Comments

      Archives

      • November 2021
      • October 2021
      • December 2020
      • November 2020
      • October 2020
      • September 2020
      • August 2020
      • July 2020
      • June 2020
      • May 2020
      • April 2018
      • March 2018
      • February 2018
      • January 2018
      • December 2017
      • November 2017
      • October 2017
      • May 2017
      • January 2016
      • November 2015
      • October 2015

      Categories

      • Attacks
      • Blog
      • Business Operations
      • Compliance and Legal
      • Data Breaches, Hacks, and Thefts
      • Penetration Testing
      • Research
      • Security Tools, Tips, and Techniques
      • Uncategorized
      • Vulnerability

      Meta

      • Log in
      • Entries feed
      • Comments feed
      • WordPress.org

      Categories

      • Attacks 9
      • Blog 32
      • Business Operations 1
      • Compliance and Legal 6
      • Data Breaches, Hacks, and Thefts 9
      • Penetration Testing 1
      • Research 9
      • Security Tools, Tips, and Techniques 15
      • Uncategorized 4
      • Vulnerability 8

      Company

      About Us
      Privacy Policy
      Terms and Conditions

      Contact Us

      • 4415 Harrison St, Ste 504
        Hillside, IL 60162
      • 708-593-3516

      Site Map

      Vulnerability Management
      Penetration Testing Services
      24/7 Security Operations Center (MSSP)
      Security Awareness/Social Engineering