Policy and Best Practices
Resources Blog

Policy and Best Practices

Keep up to date with the latest offensive security news, knowledge, and resources.
The Security Evidence Your HIPAA Assessor Will Ask For
Mar 16, 2026

The Security Evidence Your HIPAA Assessor Will Ask For

Know what a HIPAA auditor will ask for before they show up. A tier-by-tier breakdown of the security evidence that separates audit-ready organizations from the rest.
Why Your EHR Vendor’s Security Is Your Compliance Problem
Mar 12, 2026

Why Your EHR Vendor’s Security Is Your Compliance Problem

Your EHR vendor’s security gap is your HIPAA liability. Learn how third-party health IT risk exposes covered entities and what a mature vendor risk program requires.
What a DORA TLPT Assessment Actually Requires
Feb 27, 2026

What a DORA TLPT Assessment Actually Requires

Learn what DORA’s TLPT assessment requires, why most organizations fail on preparation (not vulnerabilities), and how to build a TLPT-ready security program.
How to Prepare for Penetration Testing
Sep 26, 2025

How to Prepare for Penetration Testing

Preparing for a penetration test? This checklist will inform you on what to expect and what steps you should take to get the most out of your organization’s upcoming pentest.
Vulnerability Assessment Process and 5 Critical Best Practices
Apr 02, 2025

Vulnerability Assessment Process and 5 Critical Best Practices

A vulnerability assessment identifies and evaluates potential security weaknesses in an organization's systems.
Understanding Pretexting: Techniques, Examples, and Prevention
Mar 27, 2025

Understanding Pretexting: Techniques, Examples, and Prevention

Pretexting is a social engineering attack where the attacker fabricates a scenario (or pretext) to manipulate the target into divulging personal information.
1 2 3 4 5