Security Risk Advisors

Blog

May 6, 2016, Philadelphia, PA – Security Risk Advisors will be presenting at the National Health ISAC & Aviation ISAC 2016 Spring Summit on May 12th, located at the Walt Disney World Swan and Dolphin in Lake Buena Vista, FL. Dave Mertz, Threats Ma… Continue Reading

On internal penetration tests, it is common to get a foothold using man-in-the-middle techniques such as Link-Local Multicast Name Resolution (LLMNR) or WPAD. On a recent engagement, we encountered an added challenge because NetBios over TCP was disa… Continue Reading

April 26, 2016, Philadelphia, PA – Security Risk Advisors will be presenting at the 2016 FS-ISAC Annual Summit on May 4th, located at the Loews Miami Beach.

Antonio Crespo, Consultant at Security Risk Advisors, and Vas Rajan, CSO of CLS Bank Internati… Continue Reading

Penetration testing engagements should begin with a mutually-agreed "trophy list" which represent the assets to be targeted for proof-of-concept compromise. During our penetration tests where PCI systems are in-scope, accessing the CDE and the covete… Continue Reading

On October 21st RSA kicked off their annual Archer User Summit, RSA Charge 2015.  While RSA does a great job of bringing together its Archer professionals through various networking events over the course of the year, the Archer User Summit is the bi… Continue Reading