by Tyler Butler | Jul 12, 2016 | Tutorial - Red Team
Over the years, I have seen many penetration test reports that heavily rely on the results of a vulnerability scanner such as Nessus or Qualys. While vulnerability scans are a critical component of a functional security program and are often included in security...
by Tyler Butler | Jun 21, 2016 | Tutorial - Consumer
Take a moment to consider this question: What is the most important piece of software on your computer right now? Maybe you have some expensive industry-specific licensed juggernaut. Maybe you’re a home user who just really likes Solitaire. But I would suggest...
by Tyler Butler | May 3, 2016 | Tutorial - Blue Team, Tutorial - Red Team
When I’m on an engagement, one of my favorite value-adds for a client is conducting an informal password audit. While most organizations have realized the importance of maintaining password standards, most overestimate how secure their users’ passwords are...
by Tyler Butler | Mar 29, 2016 | Tutorial - Blue Team
With our ever-increasing reliance on the Internet for interpersonal relationships, it comes as no surprise that the use of social media has gained steam for professional relationships as well. Any new form of relationship-building tools, especially digital tools, are...
by Tyler Butler | Feb 22, 2016 | Meta
Implicit Deny was started by a like-minded group of information security professionals from a variety of backgrounds. After months of swapping war stories, hacks, mitigations, workarounds, and best practices, they realized they were all asking the same question: Why...