Skip to content
Affinity IT Security
  • Cybersecurity Assessments
  • Compliance
  • Training
  • About
  • Contact
  • Articles

OUTSOURCE YOUR CYBERSECURITY

Increase security. Maintain compliance. Retain control.

Find Out How
Find and Fix Your Vulnerabilities.  Discretely. Now Find and Fix Your Vulnerabilities.  Discretely. Now

What Is … ?

What is a Penetration Test ?

February 24, 2018February 25, 2018 JoeWhat Is ... ?
Penetration Testing

It is not unusual these days, that in response to changing compliance requirements or customer expectations, your company finds itself called upon to conduct a “Penetration Test”.  “Sounds painful”, you say, “and what the heck does that mean, anyway ?” […]

Read more

What is Information Leakage ?

December 11, 2017January 8, 2018 JoeWeb Application Vulnerabilities, What Is ... ?
What is Information Leakage

Information Leakage (CWE-200) is a category of software vulnerabilities in which information is unintentionally disclosed to end-users, potentially aiding attackers in their efforts to breach application security.  The key criteria for Information Leakage is that the exposure is  unintentional and […]

Read more

What is CSV Injection ?

December 8, 2017January 8, 2018 JoeWeb Application Vulnerabilities, What Is ... ?
What Is CSV Injection ?

What Is CSV Injection ? It is not uncommon for applications to export data in comma-separated-values (CSV) format for subsequent analysis or downstream processing.  Many times that later processing includes viewing and analyzing the exported data in Microsoft Excel or […]

Read more

What is HTTP Strict Transport Security (HSTS) ?

October 6, 2017January 8, 2018 JoeWeb Application Vulnerabilities, What Is ... ?
What Is HTTP Strict Transport Security?

Web developers are  sometimes surprised to learn that it is NOT the default behavior of the browser to ensure that a site serving HTTP content over TLS/SSL (i.e. HTTPS) be required to use HTTPS for all content. “HTTP Strict Transport […]

Read more

What is Server Side Request Forgery ?

August 14, 2017January 8, 2018 JoeWeb Application Vulnerabilities, What Is ... ?
What Is Server-Side Request Forgery (SSRF)

“Server Side Request Forgery” (a.k.a. SSRF)  is a class of web-application vulnerability in which an attacker can cause a website to access unintended server-side resources, including the unauthorized reading, writing, or execution of server resources. Web-applications designed to pass URLs (references […]

Read more

Posts navigation

Older posts

Recent Posts

  • On Complexity, Convenience, Risk, and Privacy
  • A Strategy for Successfully Hiring Experienced Penetration Testing Staff
  • Measuring Phishing Risk
  • Securing IoT Networks: Security Configuration and Capacity
  • Securing IoT Networks: Measuring Network Security
  • A Security Rating Model for the Internet of Things (IoT)

Categories

  • 1O Things …
  • How To Prevent … ?
  • How To Test For … ?
  • Press Releases
  • Reasons Why…
  • Uncategorized
  • Web Application Vulnerabilities
  • What Is … ?

Cybersecurity is more critical than ever before. You need a partner with the right expertise.

Find and fix your vulnerabilities. Do it discreetly. Do it now.

Find and Fix Your Vulnerabilities. Discretely. Now

1243 Sussex Turnpike Suite #1, Randolph, NJ 07869
info@Affinity-IT.com
800.840.2335
  • 23 NYCRR 500 Compliance
  • About Us
  • Affinity IT Security
  • Application Security Testing
  • Articles
  • Be a Professional Hacker
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Penetration Tester
  • Best Hacker School
  • Best Hacking School
  • CEH Bootcamp
  • CEH Certification
  • CEH Exam
  • CEH Exam Preparation
  • CEH Instruction
  • Certified Ethical Hacker (CEH) Exam
  • Certified Ethical Hacker (CEH) Training Class
  • Choose the RIGHT Cybersecurity Partner
  • Contact Us
  • Cybersecurity Compliance
  • Cybersecurity Compliance Inquiry
  • EC Council CEH Accredited Training Center
  • Ethical Hacker Course
  • Ethical Hacker Course
  • Ethical Hacking Course
  • Getting Your CEH
  • Hacker Bootcamp
  • Hacker Training
  • HIPAA Compliance
  • Information Security Assessments and Penetration Tests
  • Information Security Training Inquiry
  • Learn Ethical Hacking
  • Learn Penetration Testing
  • Learn PenTesting
  • Network Security Testing
  • Network Vulnerability Assessment
  • PCI DSS Compliance
  • Penetration Test Training
  • Penetration Testing and Vulnerability Assessments Inquiry
  • Penetration Testing Bootcamp
  • Penetration Testing Course
  • Penetration Testing School
  • Pentesting Bootcamp
  • Pentesting Course
  • Pentesting School
  • Prepare For The CEH Test
  • Training
  • Training Course: Application Security and the SDLC
  • Training Course: Designing Secure Web Applications
  • Training Course: Employee IT Security Awareness
  • Training Course: Fundamentals of IT Security
  • Training Course: Gathering and Documenting Web Application Security Requirements
  • Training Course: Testing Web Application Security
  • Training Course: Understanding HIPAA Security Compliance
  • Training Course: Understanding NERC-CIP
  • Training Course: Understanding PCI-DSS
  • Website Security Testing
  • Website Vulnerability Assessment
  • What Cybersecurity Services Do You Actually Need ?
Powered by WordPress | Theme: Astrid by aThemes.