Blog Posts Tagged with "Penetration Testing"

314f19f082e69886c20e31c70fe6dceb

OSSTMM v3 From A Client's Perspective

December 13, 2010 Added by:Rod MacPherson

I can't think of anything I dislike about the Rules of Engagement. I would be in heaven if every vendor I dealt with held to even half the Rules. I could especially do with not being fed FUD, or a list of past clients who's engagement had little in common with what I'm looking to hire the vendor for...

Comments  (0)

43559f6a0465c923b496a260211995c0

The Case for Better Detection: A Few Real Life Experiences

November 15, 2010 Added by:Pascal Longpre

Most organizations today put their efforts on preventing security breaches. Unfortunately, they disregard the fact that their protections might eventually fail and that intruders will get in. They have little means to deal with an incident after it occurs...

Comments  (4)

F8f122d50eba11c3af5607575b277bc6

Penetration Testing for Low Hanging Fruit - Part 7 of 7

November 08, 2010 Added by:Bryan Miller

It is my hope that this series of articles have successfully made the case for performing regularly scheduled penetration tests. When combined with enforceable policies and procedures such tests can be an invaluable asset to any organization...

Comments  (10)

F8f122d50eba11c3af5607575b277bc6

Pen Testing for Low Hanging Fruit - Part 5 of 7

October 27, 2010 Added by:Bryan Miller

Security auditing needs to be thought of as a wheel that never ends or a goal that is never quite achieved. There are no 100% guarantees in the field of IT Security so testing is one way to ensure that security and privacy controls are constantly being tested...

Comments  (0)

F8f122d50eba11c3af5607575b277bc6

Pen Testing for Low Hanging Fruit - Part 4 of 7

October 21, 2010 Added by:Bryan Miller

Penetration testing is a necessary undertaking. Debate continues on whether internal or external testing is more important as well as the frequency of testing. But most security and privacy advocates agree that periodic security audits need to be performed...

Comments  (0)

F8f122d50eba11c3af5607575b277bc6

Pen Testing for Low Hanging Fruit - Part 3 of 7

October 19, 2010 Added by:Bryan Miller

The thought is that if you scare clients enough they will spend money on your products and services. This tactic may have worked 5-10 years ago but not today. With the amount of security information available on the Internet it is hard to bluff your way into a client's wallet...

Comments  (0)

F8f122d50eba11c3af5607575b277bc6

Pen Testing for Low Hanging Fruit - Part 2 of 7

October 14, 2010 Added by:Bryan Miller

The real value in penetration testing is using the information learned from one device to take control of another. The tester must follow the trail and use the clues provided to eventually gain access to the really important and sensitive data...

Comments  (2)

F8f122d50eba11c3af5607575b277bc6

Pen Testing for Low Hanging Fruit - Part 1 of 7

October 11, 2010 Added by:Bryan Miller

Security professionals have debated the definition and merits of penetration testing. One of the goals of penetration testing is to test for vulnerabilities that could be exploited by employees, contractors, guests and automated attack software such as worms, viruses and trojans...

Comments  (0)

5a432ca05467666d90425b7b869c5003

Strategies for Choosing the Right Pen Test

August 08, 2010 Added by:Ron Lepofsky

Pen tests may seem like a security test panacea. However they have been known to go terribly wrong and become vastly expensive. Here’s what you need to know to make sure you get the results you want at the price you expect...

Comments  (1)

Page « < 9 - 10 - 11 - 12 - 13 > »