Skip to content
Affinity IT Security
  • Cybersecurity Assessments
  • Compliance
  • Training
  • About
  • Contact
  • Articles

OUTSOURCE YOUR CYBERSECURITY

Increase security. Maintain compliance. Retain control.

Find Out How
Find and Fix Your Vulnerabilities.  Discretely. Now Find and Fix Your Vulnerabilities.  Discretely. Now

Joe

What is a Penetration Test ?

February 24, 2018February 25, 2018 JoeWhat Is ... ?
Penetration Testing

It is not unusual these days, that in response to changing compliance requirements or customer expectations, your company finds itself called upon to conduct a “Penetration Test”.  “Sounds painful”, you say, “and what the heck does that mean, anyway ?” […]

Read more

How To Become a Professional Hacker

January 22, 2018February 12, 2018 JoeUncategorized
How To Become A Professional Hacker

Demand for IT Security professionals is very strong right now, and many people are wondering how to get into the action. You need only turn on the news to hear of the latest cybersecurity breach, and this visibility means more […]

Read more

On Hiring a Hacker

December 23, 2017February 12, 2018 JoeReasons Why...
Hiring A Hacker

One could argue that there are two crises in the IT world today. The first is the seeming inability of many (or even most ?) companies to secure their IT infrastructure, and the second is the shortage of talent to […]

Read more

Affinity IT Security Is Now An EC Council Accredited Training Center (ATC)

December 19, 2017December 19, 2017 JoePress Releases

December 19, 2017 : Randolph, NJ Affinity IT Security announced today that they are now an official EC Council Accredited Training Center (ATC), and will now be offering cybersecurity training at their offices in Randolph, NJ.  Starting in January, clients […]

Read more

What is Information Leakage ?

December 11, 2017January 8, 2018 JoeWeb Application Vulnerabilities, What Is ... ?
What is Information Leakage

Information Leakage (CWE-200) is a category of software vulnerabilities in which information is unintentionally disclosed to end-users, potentially aiding attackers in their efforts to breach application security.  The key criteria for Information Leakage is that the exposure is  unintentional and […]

Read more

Posts navigation

Older posts
Newer posts

Cybersecurity is more critical than ever before. You need a partner with the right expertise.

Find and fix your vulnerabilities. Do it discreetly. Do it now.

Find and Fix Your Vulnerabilities. Discretely. Now

1243 Sussex Turnpike Suite #1, Randolph, NJ 07869
info@Affinity-IT.com
800.840.2335
  • 23 NYCRR 500 Compliance
  • About Us
  • Affinity IT Security
  • Application Security Testing
  • Articles
  • Be a Professional Hacker
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Penetration Tester
  • Best Hacker School
  • Best Hacking School
  • CEH Bootcamp
  • CEH Certification
  • CEH Exam
  • CEH Exam Preparation
  • CEH Instruction
  • Certified Ethical Hacker (CEH) Exam
  • Certified Ethical Hacker (CEH) Training Class
  • Choose the RIGHT Cybersecurity Partner
  • Contact Us
  • Cybersecurity Compliance
  • Cybersecurity Compliance Inquiry
  • EC Council CEH Accredited Training Center
  • Ethical Hacker Course
  • Ethical Hacker Course
  • Ethical Hacking Course
  • Getting Your CEH
  • Hacker Bootcamp
  • Hacker Training
  • HIPAA Compliance
  • Information Security Assessments and Penetration Tests
  • Information Security Training Inquiry
  • Learn Ethical Hacking
  • Learn Penetration Testing
  • Learn PenTesting
  • Network Security Testing
  • Network Vulnerability Assessment
  • PCI DSS Compliance
  • Penetration Test Training
  • Penetration Testing and Vulnerability Assessments Inquiry
  • Penetration Testing Bootcamp
  • Penetration Testing Course
  • Penetration Testing School
  • Pentesting Bootcamp
  • Pentesting Course
  • Pentesting School
  • Prepare For The CEH Test
  • Training
  • Training Course: Application Security and the SDLC
  • Training Course: Designing Secure Web Applications
  • Training Course: Employee IT Security Awareness
  • Training Course: Fundamentals of IT Security
  • Training Course: Gathering and Documenting Web Application Security Requirements
  • Training Course: Testing Web Application Security
  • Training Course: Understanding HIPAA Security Compliance
  • Training Course: Understanding NERC-CIP
  • Training Course: Understanding PCI-DSS
  • Website Security Testing
  • Website Vulnerability Assessment
  • What Cybersecurity Services Do You Actually Need ?
Powered by WordPress | Theme: Astrid by aThemes.