Poulin: You Mod it, You Own It?
If your toaster catches fire because of a design defect, you can sue the manufacturer. If your computer is compromised because of a...
Van Wyk: Security Track Record for iPhone Not an Accident
It’s not just luck. Apple has managed to keep the iPhone (and its iOS brethren) safe from any major malware outbreak for 10...
Survey: Ex-employees Keep Access to Corporate Apps, Data at Half of U.S. Firms
Former employees at about half of U.S. companies still have access to corporate applications after they leave their jobs, according to new...
April 18, 2017 | Penetration Testing and Red TeamingBy Dave Kennedy, IANS Faculty
Penetration testing has been given quite a few names over the past few years, including everything from “vulnerability scanning” all the way to “targeted and direct attacks” against organizations. This comes as attacker techniques themselves are shifting based on organizations adding more detection capabilities into their environments. In this webinar, IANS Faculty Dave Kennedy dives into some of the latest attack vectors and discusses why adversarial simulations are some of the most effective methods for building defenses within your organization.
— CLIENT PORTAL —>
Please Login to continue
Add Phishing to Your Red Team’s Playbook
Drafting a Pen-Testing Request for Quote (RFQ)
Joff Thyer on the Threat Hunter's Mindset and Making the Most of Penetration Testing