Penetration Testing

Penetration Testing

A Geek Leader Podcast: Ethical Hacking with Patrick Barry

Recently, we sat down with John Rouda, creator of A Geek Leader Podcast, to discuss some background around Rebyc Security and Ethical Hacking. Patrick Barry, CIO and Co-Founder of Rebyc Security, shared experiences and i...

Information Security Penetration Testing Phishing Registered Investment Advisor RIA Social Engineering Vulnerability Assessments

Registered Investment Advisors (RIA’s) – It’s time to invest in Cybersecurity!

This week, Ryan Neal wrote a piece for WealthManagement.com about how Registered Investment Advisors (RIA) need to step up their game when it comes to taking cybersecurity requirements seriously. Below is a quote, taken ...

Breach Password Cracking Penetration Testing

Yahoo Breach(es) – Lessons Learned for your Company

Do you Yahoo? Remember that slogan back in the 90’s in the Yahoo commercials?  Well, you wouldn’t be alone if you do Yahoo, or did at least. Per SimilarWeb, Yahoo.com is still the most popular news and media website and ...

Patch Management Penetration Testing Vulnerability Assessments

MYTH: An Internal Vulnerability Assessment is the Same as an Internal Penetration Test

This is our second National Cyber Security Awareness Month (NCSAM) post where we seek to dispel some myths about cyber security services. Throughout October, we’ll be posting some blogs breaking down some of the of the m...

Penetration Testing Vulnerability Assessments

MYTH: External Pen Test is the Same as an External Vulnerability Assessment

With National Cyber Security Awareness Month (NCSAM) now upon us, we thought it would be good to dispel some cyber security service related myths.  All too often, in conversations with our clients, we are finding they di...

Information Security Malware Penetration Testing Phishing Ransomware

Rebyc Security’s Patrick Barry at North Carolina Technology Association (@NCTA) Tech Talk Live

In case you missed it, @Rebycsecurity recently participated in a panel for the North Carolina Technology Association Tech Talk Live (@NCTA)event in Charlotte, NC.  The panel broke down some of the key differences between...

Breach Information Security Password Cracking Penetration Testing

Staying Safe After a Breach

In what’s becoming almost a daily occurrence, another breach has left usernames and hashed passwords exposed on the Internet.  Time Warner Business Class was recently breached by TeaMp0isoN, which dumped almost 4200 cred...