Jason Firch, MBA
Chief Executive Officer
/ Head Of Marketing
[/vc_column_text][vc_empty_space height=”25″][vc_column_text]Jason Firch is a veteran digital marketer and cyber security expert with a decade of experience as well as the co-founder and CEO at PurpleSec and CMO at SecureTrust Cyber.
Throughout his career, Jason has developed, deployed, and evaluated successful digital, inbound, paid, social media, and content marketing initiatives that drive demand.
Jason holds both an MBA and BA with a focus on marketing from the Bloomsburg University of Pennsylvania. He is a recipient of multiple sales awards and has been published in an international business journal. When he’s not hosting the “Security Beyond The Checkbox” podcast, or contributing to the PurpleSec blog, you’ll find Jason helping nonprofits with their online marketing.
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space height=”80″][/vc_column][/vc_row][vc_row content_width=”grid” css=”.vc_custom_1659281938962{background-color: #eadaff !important;}”][vc_column width=”1/4″][vc_empty_space height=”89″][vc_column_text]Recent Articles:[/vc_column_text][/vc_column][vc_column width=”3/4″][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1684782123001{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
How To Centralize Your Patch Management
Discover how to centralize your patch management effectively to enhance cybersecurity in your organization. Our guide explores the benefits, strategies, and tools for successful centralized patch management.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1684295308314{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
Cloud Patch Management: Best Practices For 2023
Master cloud patch management with our comprehensive guide. Boost cybersecurity, streamline updates, and fortify your cloud environment today.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1684117130340{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
How To Scan & Fix The Log4j Vulnerability: Detection, Remediation, & Prevention
Discover how to scan for and fix Log4j vulnerabilities, ensuring the security of your Java applications while continuing to benefit from this widely-used logging library.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1680870476523{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
Top 10 Vulnerability Management Trends & Predictions For 2023
Discover shocking vulnerability management trends for 2023! Experts reveal predictions that’ll change the game – Stay ahead or be hacked!
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1680624118779{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
How To Improve Visibility Of Vulnerabilities: Techniques & Best Practices
Improve vulnerability visibility in networks & cloud environments with expert tips on strategies, KPIs, prioritization, & automation. Secure your assets now!
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1680146601663{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
Windows Patch Management Best Practices For 2023
Discover best practices for Windows patch management! Learn how to streamline the process, overcome challenges, and reduce cyber attacks.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1679859759721{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
Top 9 Patch Management Challenges (Solved ✓)
Struggling to bring your patch management up to speed? Learn the key challenges along with the solutions to tackle them head on.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1679686901685{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
What Is Vulnerability Prioritization? (& How To Do It Effectively)
Learn to effectively prioritize vulnerabilities in your organization’s cyber security efforts. Discover key factors, techniques, and examples for risk-based prioritization.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1679629405250{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
How To Automate Your Patch Management In 2023
You can automate your patch management by selecting the right patch management tool that best suits your organization’s needs and configuring its automatic patching settings.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1675310929040{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
What Is Patch Management?: A Complete Guide For 2023
Patch management refers to the process of identifying, acquiring, testing, and installing software updates (also known as patches) to an organization’s systems.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1669083563402{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]PENETRATION TESTING
How To Create & Implement A Penetration Testing Policy
A penetration testing policy is a set of formalized guidelines, requirements, and standard operating procedures that serve to define the overall goals, expectations, limits, and methods.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1669083502768{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]PREVENT CYBER ATTACKS
What Is A Spoofing Attack? (And How To Prevent Them)
A Spoofing attack is a means of falsifying any individual’s identity to gain unauthorized access. As a result, attackers will cause internet activity to be rerouted and overburdened or redirected acquiring system access, data theft, and malware injection.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1668897699137{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
How To Create & Implement A Patch Management Policy
You can implement and enforce patch management policies by monitoring processes, configuring group policies, and using a patching tool such as SCCM, Satellite, or Wsus.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1668897684109{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]PREVENT CYBER ATTACKS
What Is A Backdoor Attack? (And How To Prevent Them)
A Backdoor attack is mounted on malware that negates routine authentication procedures to access a system. As a result, remote access is granted to resources within an application, such as databases and file servers.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1667786088446{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SMALL BUSINESS
Top 10 Cyber Security Benefits For Small Business
With a properly implemented cyber security strategy, businesses can be confident that their operations can be sustained indefinitely, critical data is secure, and the risk and financial implications of cyber breach are minimized.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659804302106{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SOCIAL ENGINEERING
Social Engineering: What Is It And Why Is It Effective?
Social engineering relies on human behavior and the way humans think. It takes advantage of our tendencies in an attempt to get the target to make a decision they wouldn’t normally make
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659804525333{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]NETWORK SECURITY
9 Common Types Of Malware (And How To Prevent Them)
Malware, or malicious software, is any piece of software that was written with the intent of doing harm to data, devices or to people.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659804691690{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY
Red Team VS Blue Team: What’s The Difference?
Red teams attack systems and break into defenses. Blue teams maintain internal network defenses against all cyber attacks and threats.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659804744731{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]PENETRATION TESTING
What Are The Different Types Of Penetration Testing?
The different types of penetration testing include network services, web application, client side, wireless, social engineering, and physical.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659804784972{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]NETWORK SECURITY
Common Types Of Network Security Vulnerabilities In 2022
Malware, social engineered attacks, and more! Is your business prepared to handle the most common types of network security vulnerabilities in 2022?
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659804827873{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SOCIAL ENGINEERING
How To Create An Email Phishing Campaign In 8 Steps
A phishing campaign is comprised of 8 steps including sending a questionnaire, crafting email templates, defining the vishing and/or smishing scenario, getting stakeholder buy in, performing the test, reporting on findings, and conducting security awareness training.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659804867636{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY
10 Cyber Security Trends You Can’t Ignore In 2021
Our team of IT security experts researched and analyzed the emerging threat landscape in 2020 to bring forward the top 10 cyber security trends in 2021.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659804915677{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]NETWORK SECURITY
Vulnerability Scanning VS Penetration Testing
Vulnerability scanning identifies vulnerabilities within systems on a network. Penetration testing simulates an attack to exploit vulnerabilities.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659804959797{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SMALL BUSINESS
5 Proven Network Security Tips For Small Business
Want to prevent financial loss or legal liability from cyber attacks? Follow these 5 steps to protect your network from attacks.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659804987965{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY
14 Essential Network Security Policies Templates You Need
A network security policy is a set of standardized practices and procedures that outlines rules network access, the architecture of the network, and security environments, as well as determines how policies are enforced.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659805026560{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]NETWORK SECURITY
How To Prevent Ransomware Attacks: An Expert Guide
You can mitigate or prevent ransomware attack by implementing user education and training, automating backups, minimizing attack surfaces, having an incident response plan, installing endpoint monitoring and protection across your fleet, and purchasing ransomware insurance.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659805078153{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY
SIEM VS IDS: What’s The Difference?
The main difference between a SIEM and IDS is that SIEM tools allow the user to take preventive action against cyber attacks whereas an IDS only detects and reports events.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659805106188{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY
CMMC VS NIST 800-171 (And How You Can Prepare)
CMMC stands for the Cybersecurity Maturity Model Certification. The CMMC will encompass multiple maturity levels that range from Level 1: Basic Cyber Hygiene to Level 5: Advanced / Progressive.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659806646517{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]CYBER ATTACKS
How To Prevent A Distributed Denial Of Service (DDoS) Attack
You can prevent a distributed denial of service attack by: Developing a denial of service response plan, Securing your network infrastructure, Filtering routers at the edge of your network to spot and dro DDoS connections, Blackholing the site that is being DDoS’d, thereby directing all traffic to an invalid address.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659806672998{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]CYBER ATTACKS
How To Prevent A Buffer Overflow Attack
You can prevent a buffer overflow attack by auditing code, providing training, using compiler tools, using safe functions, patching web and application servers, and scanning applications.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659806697360{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]CYBER ATTACKS
How To Prevent A ICMP Flood Attack
You can prevent ping attacks by configuring your firewall, adding filters to your router, looking at spoofed packets, monitoring traffic patterns, scanning your network.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659806722909{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]CYBER ATTACKS
How To Prevent A SYN Flood Attack
You can SYN flood attacks by installing an IPS, configuring your firewall, installing up to date networking equipment, and installing commercial monitoring tools.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659806745444{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]CYBER ATTACKS
How To Prevent A Domain Name Server (DNS) Amplification attack
You can prevent a DNS amplification attack by Implementing Source IP Verification on a network device, Disabling Recursion on Authoritative Name Servers, Limiting Recursion to Authorized Clients, and Implementing Response Rate Limiting (RRL) setting on DNS Server.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][/vc_column][/vc_row][vc_row content_width=”grid” content_aligment=”center” css=”.vc_custom_1659294547465{background-color: #f7f7f7 !important;}”][vc_column][vc_empty_space height=”64″][vc_column_text]
Meet Our Security Experts
[/vc_column_text][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”6149″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Jason FirchCEO / CMO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6188″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Josh Allen
CPO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6187″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Rich Selvidge
CISO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6293″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Michael Swanagan
Technical Editor-In-Chief[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”19383″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Dalibor Gašić
Head Of Security Research[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”20202″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Dušan Trojanović
Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”20334″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Eva Georgieva
Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”19384″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Kenneth Thomas
Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”20410″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Liam Smith
Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”17868″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Eryk Waligora
Technical Writer[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6150″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Strahinja Stankovic
Technical Writer[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][/vc_column][/vc_row]