Structure found in process

By on
Structure found in process

As technically oriented security professionals we often don’t pursue structure in our testing. We simply use the same vulnerability scans and penetration tests we’ve been using for years — updated, of course, for the latest network nasties. Today, that simply is not enough.

Performing a simple penetration test says little or nothing about the general security health of the system. And, yet, the pen test (or "ethical hacking" — an oxymoron at best) often is the preferred way to determine the overall security of the enterprise. The answer is to develop a framework ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?