Security Pursuit
  • Professional Services

    • Penetration Testing
    • Assessments
    • Incident Response
  • Managed Programs

  • Industries

    • Law Firms
    • Pension Plans
    • SaaS
    • Manufacturing
    • Energy
  • Resources

    • Blog Posts
    • Product Solutions
  • Contact Us

  • About Us

    • Our Team
  • More

    Use tab to navigate through the menu items.
    • All Posts
    • Law
    • General
    • Pensions
    • Not Viewable
    • Manufacturers
    • SaaS
    • Energy
    Search
    Canaries Provide Simple, Effective Cybersecurity

    Canaries Provide Simple, Effective Cybersecurity

    Canaries and Canary Tokens are a “Set It and Forget It” cybersecurity tool When a Canary is triggered, you know immediately that you have...
    In case you are asked:  the new Cyber Incident Reporting Act

    In case you are asked: the new Cyber Incident Reporting Act

    1. Many organizations are pulled into Critical Infrastructure 2. There's nothing to worry about just yet 3. Stay informed and be ready to...
    How the Government Can Guide Your Zero-Trust Approach

    How the Government Can Guide Your Zero-Trust Approach

    The U.S. Government issued requirements for agencies to meet zero-trust architecture standards by September 2024 Zero-Trust is vital as...
    Get Better Security Culture By Making It Personal

    Get Better Security Culture By Making It Personal

    Traditional training approaches do a poor job improving employee behavior. Cybersecurity has a negative impact on culture because it is...
    Phishing Awareness is Important, But....

    Phishing Awareness is Important, But....

    The field of cybersecurity training and awareness continues to put phishing at the forefront. For many organizations, phishing awareness...
    Misconfigurations for Office 365

    Misconfigurations for Office 365

    Microsoft Office 365 offers so many compelling benefits, from the “work anywhere on anything” to automatic upgrades to subscription plans...
    5 Common Attacks That Dodge Your Firewall.

    5 Common Attacks That Dodge Your Firewall.

    As your first line of defense, firewalls protect networks and systems against a range of cybersecurity threats coming from the internet...
    4 Pentest Paradoxes You Must Get Right

    4 Pentest Paradoxes You Must Get Right

    Penetration testing is the best way to know whether your network or applications have exploitable vulnerabilities. A pentest goes beyond...

    XDR, MDR, SOAR - Acronyms of Cybersecurity Detection & Response

    One of the basic cybersecurity needs of businesses today is to detect threats to and within networks and effectively respond to threat...
    Canaries Provide Simple, Effective Cybersecurity
    Alisha Carmichael
    • Mar 30
    • 5 min

    Canaries Provide Simple, Effective Cybersecurity

    Canaries and Canary Tokens are a “Set It and Forget It” cybersecurity tool When a Canary is triggered, you know immediately that you have...
    47 views0 comments
    In case you are asked:  the new Cyber Incident Reporting Act
    kenballard13
    • Mar 18
    • 2 min

    In case you are asked: the new Cyber Incident Reporting Act

    1. Many organizations are pulled into Critical Infrastructure 2. There's nothing to worry about just yet 3. Stay informed and be ready to...
    70 views0 comments
    5 Companies That Want Your Pentest
    kenballard13
    • Mar 14
    • 5 min

    5 Companies That Want Your Pentest

    Manufacturers should get a penetration test at least annually There are 5 companies that want your pentest, and they have very different...
    5 views0 comments
    5 Pentest Reports
    kenballard13
    • Mar 11
    • 5 min

    5 Pentest Reports

    (and the audiences that want them) Pension Plans should get a penetration test annually There are 5 audiences for your pentest, and they...
    8 views0 comments
    The 5 Audiences for your Pentest
    Ken Ballard
    • Mar 10
    • 5 min

    The 5 Audiences for your Pentest

    (and the reports you need to give them) Law firms should get a penetration test annually There are 5 audiences for your pentest, and they...
    2 views0 comments
    How the Government Can Guide Your Zero-Trust Approach
    kenballard13
    • Feb 23
    • 5 min

    How the Government Can Guide Your Zero-Trust Approach

    The U.S. Government issued requirements for agencies to meet zero-trust architecture standards by September 2024 Zero-Trust is vital as...
    28 views0 comments
    Get Better Security Culture By Making It Personal
    kenballard13
    • Feb 11
    • 5 min

    Get Better Security Culture By Making It Personal

    Traditional training approaches do a poor job improving employee behavior. Cybersecurity has a negative impact on culture because it is...
    25 views0 comments
    Phishing Awareness is Important, But....
    Ken Ballard
    • Jan 17
    • 3 min

    Phishing Awareness is Important, But....

    The field of cybersecurity training and awareness continues to put phishing at the forefront. For many organizations, phishing awareness...
    17 views0 comments
    Misconfigurations for Office 365
    kenballard13
    • Dec 7, 2021
    • 4 min

    Misconfigurations for Office 365

    Microsoft Office 365 offers so many compelling benefits, from the “work anywhere on anything” to automatic upgrades to subscription plans...
    8 views0 comments
    5 Common Attacks That Dodge Your Firewall.
    kenballard13
    • Nov 15, 2021
    • 3 min

    5 Common Attacks That Dodge Your Firewall.

    As your first line of defense, firewalls protect networks and systems against a range of cybersecurity threats coming from the internet...
    9 views0 comments
    Security Pursuit
    ABOUT
    SOCIAL

    sales@securitypursuit.com

    Tel: 720-675-ROOT (7668)

    2000 Araphahoe Street, Suite 1
    Denver, CO 80205

    • LinkedIn
    • Twitter

    © 2022 by Security Pursuit, LLC