Skip to content
Services
Show submenu for Services
Audit Services
Show submenu for Audit Services
ISO Certification Journey
PCI DSS Assessment
OpenSource Software Audit
SOC Services
HITRUST
Security Assessments
Show submenu for Security Assessments
Cloud Application Security Assessment (CASA)
Mobile Application Security Assessment (MASA)
CIS 18 Controls Assessment
Swift Customer Security Controls Assessment
AWS Infrastructure Review
Risk Control Self Assessment
Application Architecture Review
Audit & Compliance Readiness Review
Federal Assessments
Show submenu for Federal Assessments
FedRAMP
Cyber Security Maturity Model (CMMC)
NIST
FTC Data Security Orders
Privacy
Show submenu for Privacy
HIPAA/PHIPA
GDPR
Microsoft SSPA
Pen Test Services
Show submenu for Pen Test Services
Compliance Penetration Testing
Vulnerability Scanning
The Prescient Advantage
Show submenu for The Prescient Advantage
Why Prescient
Our Leadership
Our Commitment
Resources
Show submenu for Resources
Case Studies
Impartiality, Complaints & Appeals
ISO Rules for Mark and Logo Use
Confidentiality Agreement
Partners
Open main navigation
Close main navigation
Services
Show submenu for Services
Audit Services
Show submenu for Audit Services
ISO Certification Journey
PCI DSS Assessment
OpenSource Software Audit
SOC Services
HITRUST
Security Assessments
Show submenu for Security Assessments
Cloud Application Security Assessment (CASA)
Mobile Application Security Assessment (MASA)
CIS 18 Controls Assessment
Swift Customer Security Controls Assessment
AWS Infrastructure Review
Risk Control Self Assessment
Application Architecture Review
Audit & Compliance Readiness Review
Federal Assessments
Show submenu for Federal Assessments
FedRAMP
Cyber Security Maturity Model (CMMC)
NIST
FTC Data Security Orders
Privacy
Show submenu for Privacy
HIPAA/PHIPA
GDPR
Microsoft SSPA
Pen Test Services
Show submenu for Pen Test Services
Compliance Penetration Testing
Vulnerability Scanning
The Prescient Advantage
Show submenu for The Prescient Advantage
Why Prescient
Our Leadership
Our Commitment
Resources
Show submenu for Resources
Case Studies
Impartiality, Complaints & Appeals
ISO Rules for Mark and Logo Use
Confidentiality Agreement
Partners
Talk to Our Experts
Talk to Our Experts
Prescient Security Blog & News — Global Security Audit and Testing Services
The Unseen Defender: How Penetration Testing Safeguards Your Data
When Should I Renew My SOC 2 Type 2?
BlueKeep: A Novel Approach to Remote Code Execution
Can Your Coffee Hack You?
The Elegance of Simplicity
Three Things That Can Slow Down Your Penetration Test
Privilege Escalation Flaw: Manage Engine Op Manager
Passwords Are Dead, Long Live The Password
Improving Security Through Device Encryption
6 Things Every Security Assessment Report Should Include
Prescient Security at InfoSec North America
Being Compliant isn't always Being Secure
OWASP AppSec 2018 Review
Privilege Escalation Flaw Found in GoPro Fusion Studio 1.2
Windows Dynamic Data Exchange Protocol: Abuse for Fun and Profit
3 Major Considerations for Businesses Hiring a Cyber Security Company
The Thorny Road to Becoming a PCI Approved Scanning Vendor
MacKeeper Data Breach
Evolution of DDoS Attacks
Who is Really Driving?
Rootnik Trojan Can Gain Deeper Access to Android Devices