• Digital Forensics and Incident Hotline: (405)562-9945

  • Blog

  • Why You Should Use a Password Manager

    A Password manager is an application that allows you to securely store and keep track of your usernames and passwords. This is important because you shouldn't be using the same password across multiple sites. When you use the same password across multiple sites and one of them gets breached, your [...]

    Read more

    Top Cyber Security Risks for Businesses

    Cyber Security risks are something most organization are struggling to figure out. What I see happening in a lot of organizations is a lack of understanding of what bad things can happen and what the impact will be.The reasons for this differ across organizations, but the most common reasons I [...]

    Read more

    IDOR Vulnerabilities

    February 15, 2021
    IDOR Vulnerabilities

    IDOR vulnerabilities are a common problem we see during web application penetration tests. Insecure direct object references (IDOR) are a type of access control vulnerability that occurs when a web application uses user-supplied input to access objects directly.The OWASP Top 10 in 2013 listed [...]

    Read more

    Penetration Testing in Oklahoma City

    Penetration Testing is a service Crossroads Information Security offers that tests effectiveness of the security controls in your organization. Our penetration testing services have three options to choose from:Red Team Engagement: This is the traditional approach to penetration testing. Our [...]

    Read more

    Privacy and the move to Signal

    Signal just experienced a boost to its user base due to WhatsApp's recent policy changes. The need for privacy seems to be the main driver for this sudden rush to Signal, but what is the issue with privacy and how did we get here? Let's take a look at the story around privacy.From my [...]

    Read more

    Securing Your Network on a Budget

    Securing your network on a budget is a challenge most organizations face. Questions come to mind such as:Are we investing enough in information security?Are we over investing in information security?What are other companies like ours investing?What are our competitors doing for information [...]

    Read more

    How to Catch a Hacker

    January 14, 2021
    How to Catch a Hacker

    How to catch a hacker is a question that I get on a regular basis. Your success in catching a hacker largely depends on your preparation before you are hacked. Traditional incident response is the typical ways of catching a hacker, but in some cases that approach is cost prohibitive.When a [...]

    Read more

    Digital Forensics Investigations

    Digital forensics investigations are critical to solving cases such as intellectual property theft and computer incidents. Digital forensics and e-discovery includes analyzing computers, servers, mobile devices, logs, network traffic, and surveillance video in some cases.Digital forensics [...]

    Read more

    HTTPS Inspection

    January 12, 2021
    HTTPS Inspection

    HTTPS Inspection is the process of examining network traffic that takes place over SSL or TLS. This allows your intrusion prevention/detection devices to examine that encrypted traffic for malware and intrusion attempts.HTTPS Inspection is the modern approach to detecting malware and intrusions[...]

    Read more

    Image Forensics

    January 11, 2021
    Image Forensics

    Image forensics is the analysis of what evidence or information can be obtained from images taken with digital cameras or mobile devices. For the purpose of this blog I'm going to focus on the photo of a cat.As a forensic analyst the first thing I want to examine is the meta-data associated[...]

    Read more

    2 of page 5