You can't secure what you don't acknowledge.SM

Monday, December 22, 2014

Some vulnerability + penetration testing content to send off 2014

Here are some pieces I've written recently on determining just how "fit" your network and application environment really is. Whether you're an IT auditor, penetration tester, IT admin, or security consultant, there's some stuff for you:

How to perform a (next-generation) network security audit

Don’t overlook details when scoping your Web application security assessments

Top gotchas when performing email phishing tests

How to take a measured approach to automated penetration testing

Five steps for improving an authenticated vulnerability scan

Next-generation tools for next-generation network security

Look for these security flaws in your messaging environment

How do you know when a security vulnerability matters to your business?

My other information security content I've developed over the years is available on my website at  www.principlelogic.com/resources. Enjoy...here's to the great 2014 we've had - I'm so blessed to work in such an amazing field!
formation security content is available www.principlelogic.com/resources. I hope you enjoy it! - See more at: http://securityonwheels.blogspot.com/#sthash.EbvfNb5R.dpuf

My other information security content is available www.principlelogic.com/resources. I hope you enjoy it! - See more at: http://securityonwheels.blogspot.com/#sthash.EbvfNb5R.dpuf

My other information security content is available www.principlelogic.com/resources. I hope you enjoy it! - See more at: http://securityonwheels.blogspot.com/#sthash.EbvfNb5R.dpuf