Penetration Testing: Thinking outside the Black Box

By on

Perimeter security technology such as firewalls, content filtering and anti-virus protection, is paramount to a business's defense against attack but can by no means be assumed to be impenetrable.

With an increasing number of companies providing remote network access to employees and even limited access to clients and trusted partners, it is imperative that businesses minimize risk by thoroughly testing their network security. The provision of penetration testing, also known as vulnerabili...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?