Joshua Allen, B.SE.

Chief Product Officer
/ Head Of Defensive Security

Joshua is a diversely-skilled cyber security professional with 10 years of Department of Defense cyber security experience.

 

Joshua is a vulnerability management expert and is responsible for designing and developing security products for PurpleSec.

 

He recently served as a team lead for a Secure Operations (SOC) environment supervising a team in a fast-paced cloud security as a service company. Joshua’s skillsets include enterprise architecture hardening, penetration testing, web application firewall management, network security, data privacy and classification, and enterprise risk assessment.

 

linkedin transparent image

Recent Articles:

VULNERABILITY MANAGEMENT

How To Implement Risk-Based Vulnerability Management

You can implement a risk-based approach to vulnerability management by completing an asset inventory, conducting a risk assessment, calculating risk weighting, and aligning processes to mitigate risk.

Continue Reading >

VULNERABILITY MANAGEMENT

Why Continuous Vulnerability Management Is Essential In 2023

Next-generation vulnerability management activities provide continuous monitoring of an IT environment and automation to reduce the burden on IT security teams, reduce mean time to patch, and improves your return on security investment.

Continue Reading >

VULNERABILITY MANAGEMENT

Vulnerability Management Automation: How To Quickly Reduce Cyber Risk

Automating vulnerability management eliminates repetitive tasks prone to human error and replaces them with data-driven vulnerability prioritization.

Continue Reading >

DATA BREACHES

How ZLoader Malware Was Taken Down

On April 13, 2022, Microsoft announced that their Digital Crimes Unit (DCU) -in a joint effort with ESET, Black Lotus Labs, Palo Alto Networks, HealthISAC, and Financial Services-ISAC – has successfully disrupted the botnet distributing the ZLoader trojan.

Continue Reading >

DATA BREACHES

Saudi Aramco $50 Million Data Breach Explained

The threat group ZeroX is demanding $50M to prevent the public release of PII data on 14,254 employees and company intellectual property.

Continue Reading >

DATA BREACHES

Kaseya Ransomware Attack Explained By Experts

The Kaseya ransomware attack has impacted over 50 MSPs and between 800 and 1500 companies. With a ransom note of $70 million this is quickly becoming the largest ransomware attack in history.

Continue Reading >

DATA BREACHES

2021 Accellion Data Breach: What Happened & Who Was Impacted?

The Accellion file transfer application (FTA) data breach has impacted over 100 companies, organizations, universities, and government agencies around the world and continues to grow every week.

Continue Reading >

DATA BREACHES

Pulse Secure VPN Breach: What Happened & What Are The Implications?

The Pulse Secure VPN zero-day has been exploited resulting in the breach of several undisclosed defense firms and government organizations in the United States and Europe.

Continue Reading >

SECURITY STRATEGY

What Is A Security Operations Center? (SOC Expert Explains)

Security Operation Centers (SOCs) provide real-time monitoring, detection, and response in order to mitigate or prevent cyber attacks when they occur.

Continue Reading >

SOCIAL ENGINEERING

What Is A Phishing Attack? (And How To Prevent Them)

Phishing is a social engineering attack that attempts to trick people into giving up personal or sensitive information. This is typically delivered via an email.

Continue Reading >

VULNERABILITY MANAGEMENT

Internal VS External Vulnerability Scans: What’s The Main Difference?

Internal vulnerability scans have access to an internal network or credentialed account, while external scans identify vulnerabilities from outside the network.

Continue Reading >

PENETRATION TESTING

Privilege Escalation Attacks: Types, Examples, And Prevention

Privilege escalation attacks exploit weaknesses and vulnerabilities with the goal of elevating access to a network, applications, and mission-critical systems.

Continue Reading >

Jason Firch MBA - cyber security expert

Jason Firch

CEO / CMO

Michael Swanagan

Michael Swanagan

Technical Editor-In-Chief

Dalibor Gašić - cyber security expert

Dalibor Gašić

Head Of Security Research

Dušan Trojanović - cyber security expert

Dušan Trojanović

Senior Security Researcher

Eva Georgieva - cyber security expert

Eva Georgieva

Senior Security Researcher

Kenneth Thomas - cyber security expert

Kenneth Thomas

Senior Security Researcher

Liam Smith - cyber security expert

Liam Smith

Security Researcher

Eryk Waligora - cyber security expert

Eryk Waligora

Technical Writer

Strahinja Stankovic - cyber security expert

Strahinja Stankovic

Technical Writer