Articles by Christopher Camejo

How To Test For Network Security Vulnerability

Vulnerability scans rely on mostly automated tools to find potential vulnerabilities at either the network or application level Security vulnerability in any network can be found and exploited by hackers and others in no time. The only questions are when this will happen and how much damage an individual could do once they’ve gained access to the network. Recognizing this reality, most organizations test their own networks for security weaknesses, whether to meet compli...

Cybersecurity And Risk Management To Gain Traction In Security Market During 2016

Cybersecurity is a fast-changing field and 2015 was no exception. The proliferation of cybersecurity issues continued to make headlines, including the very dramatic hacking of a vehicle to allow for remote control over steering, brakes, the transmission and other critical functions. There was also state-sponsored hacking that targeted government, defense and other strategic sectors of the marketplace. Staying on top of these breaches still remains a challenge.   Securing The I...