Instead of spending on penetration testing, IT security teams should invest in identifying the malware that’s already made its way into their system.
Browsing: Penetration Testing
Trey Ford of Rapid7 comments on the recent Verizon email vulnerability disclosed by Randy Westergren.
Trey Ford, Global Security Strategist at Rapid7, offers some clarity on the discovery of the Skeleton Key malware.
Ilia Kolochenko, CEO of High-Tech Bridge, makes some cyber security predictions.
High-Tech Bridge CEO Ilia Kolochenko discusses the vital need for a deep level of IT and website security expertise that only comes from human skills.
Michael Aminzade of Trustwave reflects on what organisations can do to help protect themselves from falling victim to a breach.
Sloan McKinney discusses how both the UK Government and private businesses are starting to take cyber security seriously.
PhishMe senior researchers Ronnie Tokazowski and Shyaam Sundhar announce the top three phishing scams of 2014.
Today, there is no need to convince people that XSS (Cross-Site Scripting) was, is and probably will be the most popular web application vulnerability.
Ilia Kolochenko, CEO of High-Tech Bridge, discusses how any website, even a personal blog, can be sold on the black market.