Access your Pro+ Content below.
The penetration tester is alive and well
This article is part of the Information Security issue of January/February 2011
The malingering debate over the viability and lifespan of penetration testing as an art form and penetration testers as a species is getting tiresome. Tiresome because those doing the arguing generally confuse terms, juxtapose vulnerability management with pen-testing, and generally don't understand what white-hats do during an enterprise poke-and-probe. Let's get it straight once and for all: Pen-testing is not dead. Some vendors and expert types would like you to believe that and will try some Jedi mind-tricks to convince you -- for only a second, hopefully -- that you can, for example, automate penetration testing. You can't. Automated scans are great and are the center spoke of vulnerability management programs. They help with asset discovery and generally are good at telling you what machines are lacking which patches and if you've got a cockeyed configuration or two. But that's not a pen-test, and too many companies are confounding that as a pen-test. Pen-tests are conducted by people who are contracted to infiltrate your ...
Access this PRO+ Content for Free!
Features in this issue
Information security managers are getting more of a say in enterprise cloud initiatives and mobile device projects.
Enforcing endpoint security requires careful planning and deployment.
Stuxnet put the spotlight on critical infrastructure protection but will efforts to improve SCADA security come too late?
Columns in this issue
Security experts Bruce Schneier and Marcus Ranum debate whether network security should be based on whitelisting or blacklisting.
Automation hasn't killed the penetration tester – yet.
A look back at articles from the past shows that the same information security problems persist today.