Jason is a veteran IT manager and digital marketer with nearly a decade of proven experience in business management and operations. He is also the co-founder and Chief Executive Officer of PurpleSec. Throughout his career, Jason has developed, deployed and evaluated successful digital, inbound, paid, social media and content marketing initiatives that drive demand.
Jason holds both an MBA and BA with a focus on marketing from Bloomsburg Univeristy of Pennsylvania. He is a recipient of multiple sales awards, and has been published in an international business journel. When he’s not studying for his CISSP, or contributing to the PurpleSec blog, you’ll find Jason helping nonprofits with their online marketing.
Red and blue teams are more than just Halo references and army techniques. In fact, these teams play an important role in defending against cyber attacks that threaten business communications, sensitive client data, or trade secrets. Red teams are offensive security professionals who are experts in attacking systems and breaking into defenses. Blue te...Read More
Network vulnerabilities are constantly evolving as the bad guys seek new and intuitive ways to gain access to a business’s network. In this article, I’m going to breakdown the most common types of network vulnerabilities that threaten the security of your systems in 2019. Before we get started, let’s define what a network vulnerabili...Read More
Penetration testing attempts to exploit weaknesses or vulnerabilities in systems, networks, human resources, or physical assets in order to stress test the effectiveness of security controls. The different types of penetration tests include network services, web application, client side, wireless, social engineering, and physical. A penetration test m...Read More