Are subscription-based penetration testing services beneficial?

Security Testing and Ethical Hacking

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • honeynet

    A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. 

  • Security Wire Weekly -- May 16, 2007

    Core Security's Ivan Arce discusses the pros and cons of penetration testing, "month-of" flaw disclosure projects and hacking contests. Also, a summary of the week's news. 

  • Are hacking contests good or evil?

    This week in Security Blog Log: Gartner says hacking contests have nothing but negative results, but some security bloggers disagree. 

  • Apple fixes QuickTime flaw

    As Apple releases a fix for the QuickTime flaw at the heart of a Mac hacking contest, Gartner issues a statement saying such contests are bad for security. 

  • Anatomy of a zero-day: Security researchers face hurdles

    Despite industry organizations bringing some order to the software testing process, security researchers say obstacles continue to slow their progress. 

  • Metasploit Framework 3.0 released

    Brief: Metasploit Framework 3.0 contains 177 exploits, 104 payloads, 17 encoders and 30 auxiliary modules that perform such tasks as host discovery and protocol fuzzing. 

  • Black Hat RFID controversy has bloggers up in arms

    This week in Security Blog Log: Infosec pros slam HID Corp., the firm that tried to quash a Black Hat presentation on flaws in its RFID technology, calling HID the latest champion of security through obscurity. 

  • Core Security offers powerful testing tool

    Product review: Core Impact 6.0 is an amazing tool to validate your security posture. We highly recommend it to security engineers to verify the vulnerability of their networks. 

  • Which wireless security assessment tools are commercially available?

    Most auditors use open source tools to perform wireless assessments. There are other commerical options, though, as network security expert Mike Chapple explains in this SearchSecurity.com Q&A. 

  • Malware database access sparks debate

    Should an emerging database of more than 300,000 malware samples remain a walled community for trusted users, or is open access the best way to fight off digital desperados?