[vc_row][vc_column][vc_empty_space height=”80″][vc_row_inner content_width=”grid”][vc_column_inner width=”1/3″][vc_empty_space height=”25″][vc_single_image image=”6188″ img_size=”200×200″ style=”vc_box_circle_2″][vc_empty_space height=”25″][vc_column_text]

[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”2/3″][vc_column_text]

Joshua Allen, B.SE.

Chief Product Officer
/ Head Of Defensive Security

[/vc_column_text][vc_empty_space height=”25″][vc_column_text]Joshua is a diversely-skilled cyber security professional with 10 years of Department of Defense cyber security experience.

 

Joshua is a vulnerability management expert and is responsible for designing and developing security products for PurpleSec.

 

He recently served as a team lead for a Secure Operations (SOC) environment supervising a team in a fast-paced cloud security as a service company. Joshua’s skillsets include enterprise architecture hardening, penetration testing, web application firewall management, network security, data privacy and classification, and enterprise risk assessment.

 

linkedin transparent image[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space height=”80″][/vc_column][/vc_row][vc_row content_width=”grid” css=”.vc_custom_1659281938962{background-color: #eadaff !important;}”][vc_column width=”1/4″][vc_empty_space height=”89″][vc_column_text]Recent Articles:[/vc_column_text][/vc_column][vc_column width=”3/4″][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1666881197755{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT

How To Implement Risk-Based Vulnerability Management

You can implement a risk-based approach to vulnerability management by completing an asset inventory, conducting a risk assessment, calculating risk weighting, and aligning processes to mitigate risk.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1665783155563{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT

Why Continuous Vulnerability Management Is Essential In 2023

Next-generation vulnerability management activities provide continuous monitoring of an IT environment and automation to reduce the burden on IT security teams, reduce mean time to patch, and improves your return on security investment.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1664833834796{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT

Vulnerability Management Automation: How To Quickly Reduce Cyber Risk

Automating vulnerability management eliminates repetitive tasks prone to human error and replaces them with data-driven vulnerability prioritization.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811319213{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA BREACHES

How ZLoader Malware Was Taken Down

On April 13, 2022, Microsoft announced that their Digital Crimes Unit (DCU) -in a joint effort with ESET, Black Lotus Labs, Palo Alto Networks, HealthISAC, and Financial Services-ISAC – has successfully disrupted the botnet distributing the ZLoader trojan.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811288501{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA BREACHES

Saudi Aramco $50 Million Data Breach Explained

The threat group ZeroX is demanding $50M to prevent the public release of PII data on 14,254 employees and company intellectual property.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811344915{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA BREACHES

Kaseya Ransomware Attack Explained By Experts

The Kaseya ransomware attack has impacted over 50 MSPs and between 800 and 1500 companies. With a ransom note of $70 million this is quickly becoming the largest ransomware attack in history.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811372777{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA BREACHES

2021 Accellion Data Breach: What Happened & Who Was Impacted?

The Accellion file transfer application (FTA) data breach has impacted over 100 companies, organizations, universities, and government agencies around the world and continues to grow every week.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811403612{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA BREACHES

Pulse Secure VPN Breach: What Happened & What Are The Implications?

The Pulse Secure VPN zero-day has been exploited resulting in the breach of several undisclosed defense firms and government organizations in the United States and Europe.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811605394{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY

What Is A Security Operations Center? (SOC Expert Explains)

Security Operation Centers (SOCs) provide real-time monitoring, detection, and response in order to mitigate or prevent cyber attacks when they occur.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811597209{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SOCIAL ENGINEERING

What Is A Phishing Attack? (And How To Prevent Them)

Phishing is a social engineering attack that attempts to trick people into giving up personal or sensitive information. This is typically delivered via an email.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659811648159{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT

Internal VS External Vulnerability Scans: What’s The Main Difference?

Internal vulnerability scans have access to an internal network or credentialed account, while external scans identify vulnerabilities from outside the network.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1666881482294{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]PENETRATION TESTING

Privilege Escalation Attacks: Types, Examples, And Prevention

Privilege escalation attacks exploit weaknesses and vulnerabilities with the goal of elevating access to a network, applications, and mission-critical systems.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][/vc_column][/vc_row][vc_row content_width=”grid” content_aligment=”center” css=”.vc_custom_1659294547465{background-color: #f7f7f7 !important;}”][vc_column][vc_empty_space height=”64″][vc_column_text]

Meet Our Security Experts

[/vc_column_text][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”6149″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Jason Firch

CEO / CMO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6188″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Josh Allen

CPO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6187″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Rich Selvidge

CISO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6293″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Michael Swanagan

Technical Editor-In-Chief[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”19383″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Dalibor Gašić

Head Of Security Research[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”20202″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Dušan Trojanović

Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”20334″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Eva Georgieva

Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”19384″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Kenneth Thomas

Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”20410″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Liam Smith

Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”17868″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Eryk Waligora

Technical Writer[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6150″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Strahinja Stankovic

Technical Writer[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][/vc_column][/vc_row]