Banking & Finance

Thank You Anonymous

By |2012-04-23T08:00:46-04:00April 23rd, 2012|

We (Netragard) have been meaning to say Thank You to Anonymous for a long time now. With that said, Netragard does not condone the actions of Anonymous, nor the damage they have caused.   What Anonymous has demonstrated, and continues to demonstrate, is just how poorly [...]

Comments Off on Thank You Anonymous

Netragard’s Badge of Honor (Thank you McAfee)

By |2020-03-31T10:29:21-04:00November 15th, 2011|

Here at Netragard We Protect You From People Like Us™ and we mean it.  We don’t just run automated scans, massage the output, and draft you a report that makes you feel good.  That's what many companies do.  Instead, we "hack" you with a methodology that [...]

Comments Off on Netragard’s Badge of Honor (Thank you McAfee)

Quality Penetration Testing by Netragard

By |2020-03-31T10:30:04-04:00February 22nd, 2011|

The purpose of Penetration Testing is to identify the presence of points where an external entity can make its way into or through a protected entity. Penetration Testing is not unique to IT security and is used across a wide variety of different industries.  For example, [...]

Comments Off on Quality Penetration Testing by Netragard

Netragard Challenges your PCI Compliance

By |2020-03-31T10:30:12-04:00January 25th, 2011|

The purpose of legitimate Network Penetration Testing is to positively identify risks in a targeted IT Infrastructure before those risks are identified and exploited by malicious hackers. This enables the IT managers to remediate against those risks before they become an issue. To accomplish this the [...]

Comments Off on Netragard Challenges your PCI Compliance

Netragard’s thoughts on Pentesting IPv6 vs IPv4

By |2020-03-31T10:30:26-04:00January 14th, 2011|

We’ve heard a bit of “noise” about how IPv6 may impact network penetration testing and how networks may or may not be more secure because of IPv6.  Lets be clear, anyone telling you that IPv6 makes penetration testing harder doesn’t understand the first thing about real [...]

Comments Off on Netragard’s thoughts on Pentesting IPv6 vs IPv4

What If?

By |2020-03-31T10:32:47-04:00December 2nd, 2010|

I recently participated in a panel at the BASC conference that was held at the Microsoft New England Research & Development (NERD) building at One Memorial Drive in Cambridge. One of the questions that surfaced inspired me to write this article. While there are more security [...]

Comments Off on What If?

Define Perimeter

By |2020-03-31T10:33:20-04:00November 16th, 2010|

Its surprising to us that people still define their network perimeter by their firewall, which is often the perceived demarcation point between the Internet and the Local Area Network (LAN).  The fact of the matter is that the real demarcation point has nothing to do with [...]

Comments Off on Define Perimeter

The Human Vulnerability

By |2020-03-31T10:33:49-04:00September 13th, 2010|

It seems to us that one of the biggest threats that businesses face today is socially augmented malware attacks. These attacks have an extremely high degree of success because they target and exploit the human element. Specifically, it doesn't matter how many protective technology layers you [...]

Comments Off on The Human Vulnerability

Bypassing Antivirus to Hack You

By |2020-03-31T10:34:06-04:00August 6th, 2010|

Many people assume that running antivirus software will protect them from malware (viruses, worms, trojans, etc), but in reality the software is only partially effective. This is true because antivirus software can only detect malware that it knows to look for. Anything that doesn’t match a [...]

Comments Off on Bypassing Antivirus to Hack You

Security Vulnerability Penetration Assessment Test?

By |2020-03-31T10:34:14-04:00June 14th, 2010|

Our philosophy here at Netragard is that security-testing services must produce a threat that is at least equal to the threat that our customers are likely to face in the real world. If we test our customers at a lesser threat level and a higher-level threat [...]

Comments Off on Security Vulnerability Penetration Assessment Test?