IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Ethical Hackers

RSS Feed   
Ethical Hackers Reports
 
Changing the Paradigm of Security Testing
sponsored by Cymulate
WEBCAST: The threat landscape is dynamic – your security testing should be too. View this Forrester sponsored webinar to learn how a breach & attack simulation (BAS) platform can help get you there.
Posted: 11 Feb 2021 | Premiered: Feb 11, 2021

Cymulate

Essential Guide to Threat Management
sponsored by SearchSecurity.com
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

SearchSecurity.com

Automated Pen Testing Vs Breach & Attack Simulation
sponsored by Cymulate
EGUIDE: Attack simulation and penetration testing are popular methods for organizations to find and address potential weaknesses in their security programs – but deciding between pen testing and attack simulation can be tricky. Read this e-guide for helpful tips.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

E-Guide: VM in the Cloud
sponsored by SearchSecurity.com
EGUIDE: Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.
Posted: 01 Feb 2012 | Published: 31 Jan 2012

SearchSecurity.com

ITProTV | CompTIA PenTest+: Analyze Scripts: Python
sponsored by Cornerstone OnDemand
VIDEO: This video will walk you through how to analyze Python scripts for the CompTIA PenTest+: and will explain the foundational knowledge of Python so that you are better equipped to write scripts and analyze and discern the purpose of scripts you come into contact with. Tune in to start your test prep.
Posted: 26 Jun 2020 | Premiered: 26 Jun 2020

Cornerstone OnDemand

How Cyberattack Simulations Differ From Penetration & Vulnerability Tests
sponsored by Cymulate
WHITE PAPER: Targeted cyberattack simulation, vulnerability scans, penetration testing – which of these is the most effective method of identifying weaknesses within your defenses and ensuring your security capabilities can handle the rigors of today’s cyberthreats? Read this white paper to find out.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

An Expert Guide to the PCI DSS 3.0
sponsored by SearchSecurity.com
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER: Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

Magic Quadrant for Static Application Security Testing
sponsored by Veracode, Inc.
WHITE PAPER: In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences