ProCircular founder and Chief Executive Officer, Aaron Warner is slated to speak at the first annual Awareness Con, an information security conference hosted by Black Hills Information Security (BHIS). The event will be hosted on Wednesday, November 20th in Adel, Iowa at the Adel Public Library. The purpose of Awareness Con is to draw attention to the profession of ethical hacking, commonly referred to as Penetration Testing, and the benefits this practice can have for organizations of all types. Penetration Testing is a simulated attack on an organization's computer and physical security systems to ensure that existing security measures in place are effective.
ProCircular CEO, Aaron Warner supports the cyber community
Topics: Cybersecurity, Penetration Testing, Company News
Chances are that if you've used the internet in the last 15 years you've been subjected to more ads than there are grains of sand on a beach. There's also a good chance you've gotten sick of them and installed an Adblocker.
Topics: Cybersecurity, Information Security, consumer security
(October, 2019) ProCircular, Inc. of Coralville and Des Moines, Iowa is excited to share the addition of new staff and the creation of several new positions. Among other additions, the firm is adding the following:
Topics: Cybersecurity, Company News
Nmap Techniques for Security and Administration
One of the most popular tools in infosec would have to be Nmap. Nmap is a Swiss Army knife of a tool when it comes to networking and is used by many more than just the infosec crowd. Network and Systems Administrators have come to rely on this tool to gather information about their environments.
Topics: Cybersecurity, Data Security
It’s common knowledge that websites are able to give users free content by serving advertisements and performing analytics in order to generate revenue (full disclosure: if you check this page’s source code, you’ll see Google Analytics and HubSpot). It turns out that between you and the website you’re browsing, there are a few friendly third parties who are very interested in your data. Let’s take a surface level look into how online tracking works, and how you may be uniquely identified with a few JavaScript API calls.
Topics: Cybersecurity, Information Security, Personal Privacy