This webinar will define and explain common penetration test offerings in detail, outline the key differences and benefits, and help you decide which engagement type is the best fit for […]
How to progress toward a truly secure organization and infrastructure after penetration testing.
You did it – you paid for penetration testing services.
Whether it was to fulfill a potential client’s request, […]
Global research and advisory firm, Gartner, forecasts that information security spending will exceed $124 billion in 2019, yet cyber defenses continue to fail. Organizations large and small continue to experience […]
Why the Internet of Things is a penetration tester’s most valuable asset.
As technology moves at a seemingly exponential rate of growth and changes every day, more and more devices are […]
This past week I completed the SANS SEC560 – Network Penetration Testing and Ethical Hacking course at the SANS Cyber Defense Initiative […]
What is a Malicious File Execution Vulnerability?
Malicious file execution vulnerabilities (also called File Inclusion Vulnerabilities) is a vulnerability that occurs due to user input or uploads to websites not being […]