Are subscription-based penetration testing services beneficial?

Security Testing and Ethical Hacking

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Are penetration tests essential for enterprise network security?

    Penetration testing can provide valuable information on the state of your security defenses, but it's quite expensive. In this expert Q&A, Mike Chapple explains whether an organization should make the move. 

  • How to select a penetration tester

    Penetration testing tools can simulate attacks and help organizations get an idea of their security vulnerabilities. In this SearchSecurity.com Q&A, platform security expert Michael Cobb explains what you should be getting out of your penetration tes... 

  • The Art of Software Security Testing

    Read an excerpt from the book, The Art of Software Security Testing: Identifying Software Security Flaws. In Chapter 11, "Local Fault Injection," the authors explain the proper methods for examining file formats. 

  • war dialer

    A war dialer is a computer program used to identify the phone numbers that can successfully make a connection with a computer modem. 

  • white hat

    White hat describes a hacker (or, if you prefer, cracker) who identifies a security weakness in a computer system or network but, instead of taking malicious advantage of it, exposes the weakness in a way that will allow the system's owners to fix th... 

  • ethical hacker

    An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. 

  • gray hat (or grey hat)

    Gray hat describes a cracker (or, if you prefer, hacker) who exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners. 

  • Testing security of apps could put pressure on vendors

    Gartner IT Security Summit: Companies should shoulder some of the responsibility for testing applications to put pressure on vendors to create more secure software, say panelists. 

  • Cyber Storm

    Cyber Storm is the name of a simulated attack exercise conducted by the U.S. Department of Homeland Security (DHS) February 6-10, 2006 to evaluate whether or not the country could withstand a real attack of similar magnitude... 

  • honeynet

    A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security.