Email Alerts
-
PDF download: Information Security magazine November 2012
In this issue, find out who won this year’s Security 7 Award, Also, we examine the pros and cons of the Metasploit penetration testing framework. Feature
-
Metasploit Review: Ten Years Later, Are We Any More Secure?
Some say the pen testing framework is a critical tool for improving enterprise security, while others say it helps attackers. Feature
-
Age-old vulnerabilities, attack techniques consistently trip enterprises
Windows security has improved, but longstanding Unix and network vulnerabilities remain an easy target for determined attackers. News
-
Pen testers should broaden scope, focus more on people, expert says
Pen testers often focus on system errors and application flaws, but employees are often an enterprise's greatest weakness, explains Chris Nickerson. News
-
Internet scan finds thousands of device flaws, system weaknesses
Unpatched databases, misconfigured routers and more than 1,000 passwords were exposed in an Internet probe over 20 days by Metasploit creator HD Moore. News
-
Establishing an effective internal security pen testing methodology
In this month’s cover story, senior VP of research and CTO at IANS, David Shackleford, clarifies best practices for security pen testing as well as offers practical steps for building an internal testing program, how to measure success, what kinds of... E-Zine
-
Social engineering penetration testing: Four effective techniques
Social engineering penetration testing is now a must for enterprises. Learn about the four methods your pen tests should use. Tip
-
Dave Shackleford on improving internal pen testing methodology
Video: Learn how to improve your pen testing methodology in the areas of reconnaissance, scanning, enumeration, penetration and reporting. Video
-
How to build C-level support for the benefits of penetration testing
Matt Pascucci offers advice on how to justify the value and present the benefits of penetration testing to corporate executives. Answer
-
Screencast: Employ the FOCA tool as a metadata extractor
Mike McLaughlin demos the FOCA tool as a metadata extractor to expose the 'hidden' data users often post on their own websites. Video
Security Management Strategies for the CIO