vulnerability scanning


Exodus Intelligence Security Firm offers up to $500,000-dollar bounty for security exploits

One way companies are now attempting to discover vulnerabilities in their software or products, is to offer a bounty for any exploits that are found in their software by any third party’s. This is a good way for companies to motivate the public to actively search out exploits. These exploits […]


Power strips vs Surge Protectors vs UPS what one should I use?

When people think about securing their computer systems they seem to focus on things like antivirus programs and firewalls. However, making sure their physical system is secure is just as important. Insuring that your system is safe from spikes in electricity adds to maintaining the health of your system and for continuing […]


Security Penetration Testing Methodology Explained

Penetration Testing Companies and Methodology Explained: Before 2020, the Information Security industry is expected to be just under 200 billion dollars.  Yes, that’s billion… with a B.  In 2016, there were nearly 1 million job openings.  What is the cause of this unbelievable growth?  The answer is because criminals are […]