Jason is a veteran IT operations manager and digital marketer with a decade of experience. He is the co-founder and CEO of PurpleSec as well as the director of marketing for Assured Compliance Technology.
Throughout his career, Jason has developed, deployed and evaluated successful digital, inbound, paid, social media and content marketing initiatives that drive demand.
Jason holds both an MBA and BA with a focus on marketing from Bloomsburg Univeristy of Pennsylvania. He is a recipient of multiple sales awards, and has been published in an international business journel. When he’s not studying for his CISSP, or contributing to the PurpleSec blog, you’ll find Jason helping nonprofits with their online marketing.
Network vulnerabilities are constantly evolving as the bad guys seek new and intuitive ways to gain access to a business’s network. In this article, I’m going to breakdown the most common types of network vulnerabilities that threaten the security of your systems in 2019. Before we get started, let’s define what a network vulnerabili...Read More
Penetration testing attempts to exploit weaknesses or vulnerabilities in systems, networks, human resources, or physical assets in order to stress test the effectiveness of security controls. The different types of penetration tests include network services, web application, client side, wireless, social engineering, and physical. A penetration test m...Read More
As cyber attacks continue to become more sophisticated, businesses are required to invest in more robust security solutions like network vulnerability scans and penetration tests to protect their data, reputation, and revenues. Vulnerability scans identify known vulnerabilities, lack of security controls, and common misconfigurations within systems on...Read More
Red and blue teams are more than just Halo references and army techniques. In fact, these teams play an important role in defending against cyber attacks that threaten business communications, sensitive client data, or trade secrets. Red teams are offensive security professionals who are experts in attacking systems and breaking into defenses. Blue te...Read More
While it’s true that enterprise companies are targeted by cyber attacks daily it’s actually small businesses that face the most risk of loss. This is because many of these businesses either lack the resources to invest in cyber security or they don’t view security as a priority. The city of Baltimore chose not to invest in the...Read More
You just completed a vulnerability assessment and you’ve remedied all or most of the identified vulnerabilities. A network penetration test is often the next step to validate the risk assessment with the goal of enhancing a business’s security posture. There are four main steps to performing a network penetration test which includes 1) inf...Read More
Penetration testing, also known as ethical hacking, is the practice of checking the security weaknesses of application software, networks, computers and devices, wireless systems, and employees. Penetration tests can be either external or internal depending on the goal of the project. An external penetration test researches and attempts to exploit vul...Read More
Recent statistics showing trends in cyber security threats to the healthcare industry are a cause for concern. Because healthcare facilities are critical, they are increasingly becoming the target of cyber attacks. In this article, I’d like to take a closer look at these statistics, and what they actually mean for anyone responsible for ensuring t...Read More
A network security policy is a set of standardized practices and procedures designed to protect a business’s network from malicious attacks. While implementing network security policies are considered industry best practice, it alone will not guarantee protection from a data breach or socially engineered attack. It’s important to incorporate layers of se...Read More