Jason is a veteran IT operations manager and digital marketer with a decade of experience. He is the co-founder and CEO of PurpleSec as well as the director of marketing for Assured Compliance Technology.
Throughout his career, Jason has developed, deployed and evaluated successful digital, inbound, paid, social media and content marketing initiatives that drive demand.
Jason holds both an MBA and BA with a focus on marketing from Bloomsburg Univeristy of Pennsylvania. He is a recipient of multiple sales awards, and has been published in an international business journel. When he’s not studying for his CISSP, or contributing to the PurpleSec blog, you’ll find Jason helping nonprofits with their online marketing.
Red and blue teams are more than just Halo references and army techniques. In fact, these teams play an important role in defending against cyber attacks that threaten business communications, sensitive client data, or trade secrets. Red teams are offensive security professionals who are experts in attacking systems and breaking into defenses. Blue te...Read More
Network vulnerabilities are constantly evolving as the bad guys seek new and intuitive ways to gain access to a business’s network. In this article, I’m going to breakdown the most common types of network vulnerabilities that threaten the security of your systems in 2019. Before we get started, let’s define what a network vulnerabili...Read More
Penetration testing attempts to exploit weaknesses or vulnerabilities in systems, networks, human resources, or physical assets in order to stress test the effectiveness of security controls. The different types of penetration tests include network services, web application, client side, wireless, social engineering, and physical. A penetration test m...Read More
As cyber attacks continue to become more sophisticated, businesses are required to invest in more robust security solutions like network vulnerability scans and penetration tests to protect their data, reputation, and revenues. Vulnerability scans identify known vulnerabilities, lack of security controls, and common misconfigurations within systems on...Read More
Penetration testing, also known as ethical hacking, is the practice of checking the security weaknesses of an application software, computer system or network. Penetration tests can be either external or internal depending on the goal of the project. An external penetration test researches and attempts to exploit vulnerabilities that could be performe...Read More
It’s no secret that businesses are lucrative targets for would-be assailants. Most businesses, especially enterprise corporations, store valuable data and trade secrets that attackers want to use as leverage against the company or to sell it on the market. Unfortunately, small and mid-sized businesses make for perfect targets because they often ...Read More
Recent statistics showing trends in cyber security threats to the healthcare industry are a cause for concern. Because healthcare facilities are critical, they are increasingly becoming the target of cyber attacks. In this article, I’d like to take a closer look at these statistics, and what they actually mean for anyone responsible for ensuring t...Read More
A network security policy is a set of standardized practices and procedures designed to protect a business’s network from malicious attacks. While implementing network security policies are considered industry best practice, it alone will not guarantee protection from a data breach or socially engineered attack. It’s important to incorporate layers of se...Read More