Tag Archives: Independent Security Evaluators

A Hack the Box Walkthrough  – Resolute (ISE Blog)

First, we’ll start with a TCP scan, and if no interesting services are found, we can switch to a UDP scan to uncover more potential attack surface. I use a standard nmap command ... More

How to Harden OpenVPN in 2020 (ISE Blog)

Since everyone is working from home for the foreseeable future, corporate IT departments are scrambling to bolster existing VPN solutions or deploy new ones as fast as possible. On... More

Security Guidance Fit for a Pandemic (ISE Blog)

As many of us transition to mandatory teleworking scenarios, thought pieces are popping up in every corner of the internet on how to best work from home. We wanted to take the oppo... More

M&E Journal: Break Your App. Do It Again

By Ted Harrington, Executive Partner, Independent Security Evaluators (ISE) - In karate, earning a black belt isn’t the end of your journey; it is just the beginning. So too is ... More

ISE: IoT Manufacturers Missing Major Device Vulnerabilities

In just 13 Internet of Things (IoT) devices consulting and research firm Independent Security Evaluators (ISE) discovered 125 vulnerabilities, pointing to an industrywide problem w... More

How to Combat the ‘Accidental Insider’ in Your Organization

Contending with outside security threats to your organization is challenging, but dealing with the “accidental insider” — an attacker not necessarily motivated to attack the ... More

3 Things You Need to Know about Securing a Blockchain (ISE Blog)

As leaders around the globe investigate how to leverage the benefits of blockchain technologies, security is often a primary concern. They may be aware of the many security benefit... More

M&E Journal: Securing Cloud Workflows: Why Misconfiguration and Improper Design Matter

By Ted Harrington, Executive Partner, Independent Security Evaluators - Content owners and their vendors face a burning problem: there is a compelling business case to migrate to ... More

Smart Hollywood Summit: Don’t Neglect Blockchain Security

LOS ANGELES — Just by its definition, blockchain sure sounds synonymous with security: A decentralized database, comprised of a chain of records (or “blocks”), with each bloc... More

ISE: Leading Password Managers are Insecure (CBR)

Leading password managers are rife with insecurities when it comes to memory management, failing to scrub data from local memory that could be used to expose their bank of user pas... More