PenTest: ISO 27001: Real Life Practical Advice from Top Security Experts
Dear PenTest Readers, Is the ISO 27001 standardization equally efficient in practice and theory? Is this time and money requiring …
Read MorePentesting high security environments
Joe McCray - Big Bang Theory https://www.hacktivity.com/ This presentation focuses on pentesting high security environments, new ways of identifying/bypassing common …
Read MoreCyber Security in Oil and Gas 2014
Cyber Security in Oil and Gas 2014 27-29 January 2014 | Abu Dhabi, UAE The Cyber Security in Oil and …
Read MoreBasics of Pentesting - PenTest StarterKit 02/13 TEASER
Dear PenTest Readers! We are pleased to present you the TEASER of the second issue of PenTest StarterKit. Last time …
Read MoreHow Biometrics Enhance Our Enterprise Security - PenTest Regular 10/12
no_access download id="201" format="4" ym_user_is_not package="1"ym_login register_text="Register" redirect="/pentest-regular-1012/" lostpassword_text="Lost password?"/ym_user_is_not /no_access private ym_user_is package="1" Click the link below to download …
Read MoreCommercial Honeypots - PenTest Extra 6/2012
no_access download id="195" format="4" ym_user_is_not package="1"ym_login register_text="Register" redirect="/pentest-extra-6_2012-honeypots/" lostpassword_text="Lost password?"/ym_user_is_not /no_access private ym_user_is package="1" Click the link below to download …
Read MoreWhy should I let a hacker into my computers?
That’s an absolutely fair question. I don’t want to techno-babble at you, it doesn’t help with this question. Rather, let’s …
Read More