Share

Category: Penetration Testing

How Third-Party Risk Becomes Your Weakest Link

Third-party risk is expanding faster than traditional vendor assessments can manage. Despite widespread use of questionnaires and compliance reviews, most organizations continue to experience breaches linked to external vendors and downstream partners. The problem is the gap between perceived oversight and actual exposure. Many organizations evaluate only a fraction of their vendor ecosystem, rely on […]

read more

The Capital One Hack That Had Credit Card Users Asking Who’s in Their Wallet

In the summer of 2019, a hacker by the name of Paige A. Thompson gained access to Capital One’s customer data. This data included names, addresses, phone numbers, and other sensitive data Capital One collected when its customers applied for credit cards. This gigantic breach included sensitive data of approximately 100 million people.   The hacker […]

read more