Page Loader Logo
Loading...
833-847-3280
Schedule a Call
Partner With Us

Category: Application

Scheduling Your Penetration Test
You’re ready to schedule your penetration test, but aren’t sure when that should be. Should it be at the beginning of the year or the end of the year? Are there industry standards that apply to scheduling your test? In this video, we take a…
Are developers slowing the progress of security?
Recently, we reviewed a report with a customer and received some interesting feedback regarding issues with mitigation.  Some of the issues they were having trouble mitigating were related to supporting HTTP, and TLS versions below 1.3 instead of forcing HTTPS with TLS 1.3.   Another…
What is Digest Authentication?
Digest authentication is one way of confirming the identity of a user before sending sensitive information. This is done by the web server when a user requests information in a web browser. It is considered one of the more secure methods for authentication but isn’t…
How Can I Tell a Real Pen Test from a Fake?
There are a lot of companies selling penetration tests (pen tests), but how do you know if what you are getting is a real pen test? When it’s something that’s less tangible than, say, getting an oil change, it can be hard to determine if…
What is the OWASP® Top 10
You may have seen the OWASP® Top 10 on our site or around the web and are wondering what it is. What is OWASP®? Let’s start with what OWASP® is.  It stands for the Open Web Application Security Project®. They are a nonprofit organization whose…
What Are Rules of Engagement in Pen Testing?
If you think the Rules of Engagement sound like a war movie, you’re not alone.  In the penetration testing world, it’s more about cyber warfare, indirectly. What is it? Proactive penetration testing can help combat would-be attackers by identifying vulnerabilities before they do.  The Rules…
Can I do the Pen Test Myself?
Conducting pen tests might seem easy enough with the right tools and some YouTube videos.  Sure, you can do the test yourself, but here’s why you shouldn’t. Pen test certifications Pen testers should have certifications that show they know what they are doing.  These certifications…
White Box, Gray Box, and Black Box Testing, Oh My
In speaking with many of our clients, MainNerve’s staff has fielded countless questions about the type of penetration testing and approach that will be used, such as black box testing.  Often, clients are uncertain of what they need for their business. We work with them…
Are You Properly Testing Your Web Application Security?
Are you properly testing your Web Application Security? According to a report from Imperva, the number of new web application vulnerabilities disclosed in 2017 increased 212% over the previous year, jumping to 14,082 from 6,615. In addition, the report found more than half of all…
3 Ways To Protect Your Applications From Authentication Bypass Attacks
An authentication bypass attack could allow a hacker to steal sensitive data. It could also compromise your server and even take control of site administration. Are you doing enough to protect your applications from these attacks? Strong web application security systems evaluate all access requests,…
contact

Our Team

Name(Required)
This field is for validation purposes and should be left unchanged.
quick links to

Our Services

On Load
Where? .serviceMM
What? Mega Menu: Services
201 E Pikes Peak Ave Suite 2025
Colorado Springs, CO 80903