Areas Of Expertise
[vc_row][vc_column][vc_empty_space height=”80″][vc_row_inner content_width=”grid”][vc_column_inner width=”1/3″][vc_empty_space height=”25″][vc_single_image image=”6188″ img_size=”200×200″ style=”vc_box_circle_2″][vc_empty_space height=”25″][vc_column_text]
[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”2/3″][vc_column_text]
Joshua Allen, B.SE.
Chief Product Officer
/ Head Of Defensive Security
[/vc_column_text][vc_empty_space height=”25″][vc_column_text]Joshua is a diversely-skilled cyber security professional with 10 years of Department of Defense cyber security experience.
Joshua is a vulnerability management expert and is responsible for designing and developing security products for PurpleSec.
He recently served as a team lead for a Secure Operations (SOC) environment supervising a team in a fast-paced cloud security as a service company. Joshua’s skillsets include enterprise architecture hardening, penetration testing, web application firewall management, network security, data privacy and classification, and enterprise risk assessment.
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space height=”80″][/vc_column][/vc_row][vc_row content_width=”grid” css=”.vc_custom_1659281938962{background-color: #eadaff !important;}”][vc_column width=”1/4″][vc_empty_space height=”89″][vc_column_text]Recent Articles:[/vc_column_text][/vc_column][vc_column width=”3/4″][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1666881197755{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
How To Implement Risk-Based Vulnerability Management
You can implement a risk-based approach to vulnerability management by completing an asset inventory, conducting a risk assessment, calculating risk weighting, and aligning processes to mitigate risk.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1665783155563{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
Why Continuous Vulnerability Management Is Essential In 2023
Next-generation vulnerability management activities provide continuous monitoring of an IT environment and automation to reduce the burden on IT security teams, reduce mean time to patch, and improves your return on security investment.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1664833834796{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
Vulnerability Management Automation: How To Quickly Reduce Cyber Risk
Automating vulnerability management eliminates repetitive tasks prone to human error and replaces them with data-driven vulnerability prioritization.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811319213{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA BREACHES
How ZLoader Malware Was Taken Down
On April 13, 2022, Microsoft announced that their Digital Crimes Unit (DCU) -in a joint effort with ESET, Black Lotus Labs, Palo Alto Networks, HealthISAC, and Financial Services-ISAC – has successfully disrupted the botnet distributing the ZLoader trojan.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811288501{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA BREACHES
Saudi Aramco $50 Million Data Breach Explained
The threat group ZeroX is demanding $50M to prevent the public release of PII data on 14,254 employees and company intellectual property.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811344915{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA BREACHES
Kaseya Ransomware Attack Explained By Experts
The Kaseya ransomware attack has impacted over 50 MSPs and between 800 and 1500 companies. With a ransom note of $70 million this is quickly becoming the largest ransomware attack in history.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811372777{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA BREACHES
2021 Accellion Data Breach: What Happened & Who Was Impacted?
The Accellion file transfer application (FTA) data breach has impacted over 100 companies, organizations, universities, and government agencies around the world and continues to grow every week.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811403612{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA BREACHES
Pulse Secure VPN Breach: What Happened & What Are The Implications?
The Pulse Secure VPN zero-day has been exploited resulting in the breach of several undisclosed defense firms and government organizations in the United States and Europe.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811605394{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY
What Is A Security Operations Center? (SOC Expert Explains)
Security Operation Centers (SOCs) provide real-time monitoring, detection, and response in order to mitigate or prevent cyber attacks when they occur.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811597209{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SOCIAL ENGINEERING
What Is A Phishing Attack? (And How To Prevent Them)
Phishing is a social engineering attack that attempts to trick people into giving up personal or sensitive information. This is typically delivered via an email.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811648159{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
Internal VS External Vulnerability Scans: What’s The Main Difference?
Internal vulnerability scans have access to an internal network or credentialed account, while external scans identify vulnerabilities from outside the network.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1666881482294{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]PENETRATION TESTING
Privilege Escalation Attacks: Types, Examples, And Prevention
Privilege escalation attacks exploit weaknesses and vulnerabilities with the goal of elevating access to a network, applications, and mission-critical systems.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][/vc_column][/vc_row][vc_row content_width=”grid” content_aligment=”center” css=”.vc_custom_1659294547465{background-color: #f7f7f7 !important;}”][vc_column][vc_empty_space height=”64″][vc_column_text]
Meet Our Security Experts
[/vc_column_text][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”6149″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Jason Firch
CEO / CMO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6188″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Josh Allen
CPO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6187″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Rich Selvidge
CISO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6293″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Michael Swanagan
Technical Editor-In-Chief[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”19383″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Dalibor Gašić
Head Of Security Research[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”20202″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Dušan Trojanović
Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”20334″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Eva Georgieva
Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”19384″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Kenneth Thomas
Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”20410″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Liam Smith
Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”17868″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Eryk Waligora
Technical Writer[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6150″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Strahinja Stankovic
Technical Writer[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][/vc_column][/vc_row]