Penetration Tests
By: Internet Security Systems, Inc. View more from Internet Security Systems, Inc. >>
Download this next:
What should you ask a pentesting service provider?
By: Trustwave
Type: White Paper
To augment their security stances, many organizations have partnered with a penetration testing (pentesting) service provider.
Is your business considering doing the same? Step in “11 Questions to Ask Your Pentesting Service Provider,” a resource that can guide your market exploration by highlighting the information that is crucial for your organization to consider. Questions include:
- What reporting results do you provide?
- What is your recommendation for the scope of a test?
- And more
Read now to unlock the rest of the questions.
These are also closely related to: "Penetration Tests"
-
How Can You Augment Your Security Posture?
By: Novacoast
Type: Product Overview
With cyberthreats multiplying, your organization faces growing risk. In these challenging circumstances, how can you augment your security posture?
This overview introduces a host of cybersecurity services by Novacoast – from penetration testing, to GRC, to log management and more.
Read on to determine if any of these services can meet your business’s unique security needs.
-
5 ways to reduce your internet infrastructure footprint
By: Superloop
Type: Blog
Why should you work to minimize your organization’s internet infrastructure footprint? Because hackers often search the internet for vulnerable devices to exploit.
Along with delving into that issue, this blog maps out 5 actionable steps you can take to reduce your internet infrastructure footprint.
#1: Perform penetration tests
#2: Set in motion a frequent, stringent patching schedule
To unlock the rest, and to explore the other insights, continue on.
Find more content like what you just read:
-
Proactive Security: Software vulnerability management and beyond
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
-
Royal Holloway: Testing antivirus efficacy in Linux
By: TechTarget ComputerWeekly.com
Type: Ezine
Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
Penetration testing; Find vulnerabilities before hackers can
By: Bitdefender
Type: Product Overview
Every new technology introduced to your organization adds further complexity to the attack surface. Bitdefender offers customized Red Team Exercises that simulate real-life threat actors to identify vulnerabilities so that your security teams can resolve them before real hackers can exploit them. Read on to learn more.
-
Alleviating the Stress of CISOs
By: Trustwave
Type: Product Overview
The duties of CISOs are seemingly endless. According to a report by Nominet Cyber Security, 48% of CISOs shared that the stress caused by the job has impacted their mental health. In an effort to alleviate some of that stress, Trustwave developed teams to serve as resources for CISOs. Explore this overview to learn more.
-
Ask the experts: Discover how to handle external security auditors
By: Dell Software
Type: eGuide
A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.
-
HIPAA compliance: A strategic, efficient approach
By: Coalfire
Type: White Paper
Tap into this white paper to learn how you can efficiently manage your HIPAA program in a strategic fashion by assigning track leaders that are responsible for key elements of your HIPAA program.
-
7 steps to improve your organization’s cybersecurity
By: CyberMaxx
Type: eBook
Cyberattacks on public sector entities are growing in complexity and frequency. To stay secure in the future, organizations should consider adopting a defense-in-depth approach. Download this full e-book now to discover detailed strategies to fortify your cybersecurity efforts.
-
Panduit wireless solution guide
By: Panduit
Type: Product Overview
Wireless connectivity continues to make meaningful penetration into networks, unlocking performance and transforming the way your people work.Dive into this Panduit solution guide for an overview of in-building wireless solutions, including:Panduit Fault Managed Power SystemThe SmartZone Uninterruptible Power SupplyThe SmartZone G5 iPDUs
-
How to accurately identify trusted users in near-real time
By: LexisNexis
Type: White Paper
Cybercriminals go anywhere they see value. Though healthcare is only one industry affected, healthcare organizations are being targeted more because of the wealth of information and its value on the black market. Download this white paper for guidance on how to accurately identify trusted users in near-real time
-
The fastest route to PCI DSS compliance
By: Pcysys
Type: Product Overview
PCI DSS compliance has dropped 28% since 2016 – and while there are several factors that can explain this, most of them can be addressed by enhancing compliance programs with automated penetration testing and continuous validations capabilities. Read this solution brief to learn how PenTera can help speed up your route to PCI DSS compliance.
-
Web Browser Security Features Make Attacks Harder
By: TechTarget Security
Type: eGuide
This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
-
Toughening up web and mobile application security
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.
-
The growing buying team: Addressing unique considerations for bigger teams
By: TechTarget
Type: Infographic
In this infographic, explore insights on the ever-growing IT buying team and discover practical advice on how to engage the whole purchasing team throughout a complicated buying process.
-
The state of penetration risk
By: Coalfire
Type: Research Content
By studying new attacks, and analyzing adversarial behavior, organizations can better track and understand attackers, their goals and their tactics. Download this report on the state of penetration risk to unlock statistics and information that you can use to develop a threat-informed cybersecurity strategy for your organization.
-
Bluetooth Low Energy: The IoT battle
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
-
How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction
By: AT&T Cybersecurity
Type: White Paper
Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.
-
5 strategies for ironclad endpoint security
By: Palo Alto Networks
Type: eBook
What can security teams do to stop attackers from penetrating endpoints and deploying ransomware or stealing information? Read this e-book to explore the top requirements to consider when pursuing a more modern approach to securing endpoints.
-
Application security: best practices and risks
By: TechTarget ComputerWeekly.com
Type: eGuide
Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
-
Untamed threats: Securing your apps in the wild
By: Digital.ai
Type: eBook
Download this study to learn how security professionals can safeguard their apps and users from malicious activities by illuminating and quantifying the threats to applications in the wild.
-
CW Europe – March 2018
By: TechTarget ComputerWeekly.com
Type: Ezine
Cities in continental Europe will be eyeing opportunities to attract more startup firms in view of the potential scenario that London and the UK more widely might lose their appeal to entrepreneurs after Brexit.
-
E-Guide: Best practices for pen testing Web applications
By: TechTarget Security
Type: eGuide
This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
-
Application security testing: Protecting your application and data
By: TechTarget Security
Type: eBook
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
-
Application security: More important than ever
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
-
SAST vs. DAST: What Are the Differences and Why Are They Both Important?
By: Veracode, Inc.
Type: Resource
If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
-
E-Guide: Remediating IT vulnerabilities: Expert Tips
By: TechTarget Security
Type: eGuide
This expert E-Guide uncovers 3 quick ways you can remediate IT vulnerabilities and discusses best practices for improved vulnerability management.
-
How automation can drive testing and QA success
By: Qualitest Group
Type: Case Study
This case study will reveal how a leading sports-fashion retail business was able to integrate an automated testing solution and leverage parallel testing by partnering with Qualitest. Read on to learn how they sped up testing processes and improved performance for their ecommerce platform.
-
Focus: Disaster recovery planning and virtualisation
By: TechTarget ComputerWeekly.com
Type: eGuide
We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution.
-
Royal Holloway: Purple team playbook – threat modeling for security testing
By: TechTarget ComputerWeekly.com
Type: Research Content
The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
-
Pet care leader ups regression tests 25% via full phygital automation
By: Qualitest Group
Type: Case Study
A pet care leader enhanced regression testing by 25% and cut execution from 8 to 3 days with Qualitest's phygital automation. The white paper details Qualitest's approach to augment customer journey and testing productivity. Learn how phygital automation can advance your regression testing in the full white paper.
-
Royal Holloway: Man proposes, fraud disposes
By: TechTarget ComputerWeekly.com
Type: Research Content
In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
-
Achieve continuous testing at scale
By: Qualitest Group
Type: Webcast
For businesses operating at scale, efficient continuous testing is critical for maintaining security as operations expand. But how can businesses overcome the hurdles associated with enterprise-level testing? Join this webcast to learn about the complex challenges that arise in enterprise test automation and execution environments.
-
Expert guide: Reconfigure your anti-malware strategy to combat new cyber-threats
By: OpenText Security Solutions
Type: eGuide
This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
-
How to expand app security testing coverage without slowing development
By: HCL Software
Type: Case Study
Discover in this case study how HCL Tech is helping organizations implement Interactive Application Security Testing solutions, which can help businesses expand and improve security testing without slowing down application software development.
-
E-Guide: VM in the Cloud
By: TechTarget Security
Type: eGuide
Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.
-
Your key to improving your testing processes
By: Qualitest Group
Type: Case Study
When this large sports-fashion retail organization began to struggle with time-consuming, legacy testing that delayed their feedback loops, they sought out a way they could maintain reasonable test execution times without raising costs. Dig into this case study to hear the full story.
-
Step by Step: Best practices for security patch management
By: TechTarget Security
Type: eGuide
Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
-
E-Guide: Expert insights to application security testing and performance
By: TechTarget Security
Type: eGuide
Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
-
The Many Faces of Software Testing
By: TechTarget Security
Type: eGuide
Read this expertly compiled e-guide to learn how your security testing mangers can educate about, plan for, and validate the communication that is required across the enterprise to make sure that your software is secure and protected.
-
Next-generation DAST: Introducing interactive application security testing (IAST)
By: Contrast Security
Type: White Paper
While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.
-
A comprehensive guide to proven internal agency & flexible staffing solutions
By: AMN Healthcare
Type: eBook
This guide explores the features and advantages of internal agencies and internal float pools and presents compelling case studies demonstrating how our clients have skillfully executed and achieved favorable outcomes with these solutions.
-
Five Tips to Improve a Threat and Vulnerability Management Program
By: TechTarget Security
Type: eGuide
Access this e-guide for 5 expert tips to improve the effectiveness of an enterprise threat and vulnerability management program.
-
Infographic: 5 essential open source cybersecurity tools for 2022
By: TechTarget ComputerWeekly.com
Type: Infographic
There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.
-
E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010
By: TechTarget Data Center
Type: eBook
This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment.
-
Web-facing applications: Security assessment tools and strategies
By: TechTarget Security
Type: White Paper
Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.
-
A Computer Weekly buyer's guide to zero-trust security
By: TechTarget ComputerWeekly.com
Type: eGuide
Zero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.
-
A guide to continuous software delivery
By: TechTarget ComputerWeekly.com
Type: eBook
Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
-
E-Guide: Cloud computing security - Infrastructure issues
By: TechTarget Security
Type: eGuide
While cloud computing provides a number of compelling benefits, it's highly distributed. Understanding how cloud computing providers build services and manage data is critical as it can mean the difference between real cost savings and false economy.