It was an honor to be invited to speak at the ICS2 Alamo Chapter Meeting this month! For those that missed it, here is a version of the presentation. Topic: Breaching a Network With Risk-Accepted Vulnerabilities
It was an honor to be invited to speak at the ICS2 Alamo Chapter Meeting this month! For those that missed it, here is a version of the presentation. Topic: Breaching a Network With Risk-Accepted Vulnerabilities
What is Penetration Testing? Penetration testing, which some may refer to as “ethical hacking” or “white hat hacking”, is the practice of testing a computer system, network, or web application, to find vulnerabilities an attacker could exploit. Penetration testers use much of the same knowledge, tools, and techniques as malicious hackers, but they do so […]
How many of the vulnerabilities from your last penetration test report did you risk accept? Everything with a Medium severity or lower? This article is intended to help you reconsider that mindset. Be careful about disregarding penetration testing findings just because they are not High or Critical severities by themselves. Companies are breached every day […]
5 Benefits of Hiring an Ethical Hacker for Your Business: Hacking has been around for centuries, but it wasn’t until the 1950s, when computers became more widely available, hacking, as we know it today, began to emerge. In the early days of computing, hackers were mostly just curious individuals who explored computer systems for fun […]