TechGuard Blog


Grant Codak

Grant Codak
Grant has over a decade of IT experience spanning a variety of domains with a focus on defensive security. Grant is currently a Cybersecurity Expert at TechGuard Security where he performs a wide variety of proactive security services, including penetration testing. He also holds the following certifications: CISSP, CEH, Security+, Network+, A+, and Metasploit Pro Certified Specialist. Recent responsibilities include, a Senior Web Security Engineer at a Fortune 50 organization along with a variety of application administration roles in security operations. His past project work includes, web tool development as well as firewall and web proxy migrations. Currently at TechGuard Security, Grant conducts audit control assessments, penetration tests, vulnerability assessments and social engineering exercises. Grant ties his knowledge together with his deep understanding of network operations and security architecture to deliver approachable report analysis to clients. Grant is also a nature enthusiast and enjoys mountain biking, hiking and kayaking.
Find me on:

Recent Posts

Business Security in a COVID World. Now What?

On May 1st, President Trump signed a state of the emergency order that declares foreign cybersecurity threats to the electrical system a national emergency. Shortly afterward on May 15th, a cyber attack was reported in the U.K. National Market....

Building Your Primary Defense Strategy Through a Security Awareness Program

How should I start? The question going through most business leaders and policymaker's minds, is often, “Where do I start?” Creating a solid plan and making it as extensible to your future growth as possible is usually the best approach. The first...

COVID-19: Teleconferencing Concerns

There have been a lot of questions around teleconference security during this pandemic. When people are forced to use a service more, the lack of understanding and security around the product breeds fear when they start to hear about the risks that...

The Quantum Problem

Quantum cryptography or quantum encryption takes advantage of quantum mechanics to encrypt and secure message delivery. It acts similarly to modern-day encryption ciphers like AES or RSA However, when using a quantum computer for cryptography, it can...

Chaining Pathogens

Working from home? Are you finally catching up on all those updates and patches that you’ve neglected to take the time to install over the past couple of months? Well, Microsoft has also put a pause on all non-essential patches during the coronavirus...

TechGuard Attends RSA 2020

The focus of the RSA 2020 was the “Human Element.” This was certainly on display in a variety of different aspects. Attendance and foot traffic was noticeably down compared to events spanning prior years. Big names such as Verizon, IBM, and AT&T were...

Cyber Experts Have Found Themselves Using a New Four-Letter Word

RYUK Have your systems been tagged with a death note of ransomware? Ryuk has been making its rounds this December and causing holiday misery for organizations left and right this year. Typically, attacks increase near the holiday season and end of the...

Camera App Vulnerability Allows Hackers a Look at Your Private Information

What is the most un-nerving action hackers can do to your smartphone? Perhaps, hack into your camera and watch you as you go about your day? What about jack into your microphone and listen to everything you say in your daily meetings? Well, a series...

Are You Ready for CMMC?

Do you do work with the Department of Defense (DoD)? If so, are you preparing for the “CMMC?” If not, you might want to head on over here and take a look at the draft cybersecurity document that’s on the cusp of being implemented.

How You Can Better Manage Vulnerabilities

Vulnerability Management. How often do you scan your network for vulnerabilities? What does your process for remediating these vulnerabilities look like? If you’re like most companies, you might scan once a year with your yearly compliance penetration...

Compliance: You Actually Need It

One of the first steps to start your security program is finding out where you are the most vulnerable. Usually, the best way to do this is using a process or a tool that can track the risks associated with each individual asset that your business...

Exploiting the Content Filter

Ever wonder how that phishing email slipped by your state-of-the-art mail defenses? These days hackers find it’s not enough just to fool users with URL manipulation techniques. In the past, successful phishing campaigns might have yielded hundreds of...

1 2

 


 

Read More Articles →