Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2023-03-20 13:13:00 |
Vulnerability Assessment From Mitnick Security (lien direct) |
Since threat actors are constantly developing new tools and techniques for infiltrating an organization's defenses, effective cybersecurity can never be a “set it and forget it” mentality. It's true that vulnerability scans and other software tools are important to your organization's security posture - but you also need a team of cyber security experts on your side to keep up with cyber criminals. Below, we'll discuss the value of an expert eye and what you can expect with a vulnerability assessment from Mitnick Security. |
Threat
Vulnerability
|
|
★★
|
|
2023-03-07 17:00:00 |
What Is One-time Password (OTP) Social Engineering? (lien direct) |
Even if your business has a mature cybersecurity program, there may be one vulnerability that threat actors can still use to steal your company data: your employees. Social engineering has evolved over the years as threat actors deploy new methods of fooling their targets - untrained employees - into granting access to the inner workings of your organization. |
Threat
Vulnerability
|
|
★★
|
|
2022-06-30 20:00:00 |
4 Reasons Why Internal Network Penetration Testing Is Vital to Your Business (lien direct) |
Although vulnerability scans and assessments are crucial for maintaining a strong cybersecurity posture, penetration testing goes beyond the routine to thoroughly test your organization against potential security threats. There are 6 main types of penetration tests that can be performed: |
Vulnerability
|
|
|
|
2022-06-02 22:18:32 |
Pros and Cons of Vulnerability Scanning vs Penetration Testing (lien direct) |
When it comes to an organization's cybersecurity, vulnerability scanning and penetration testing can protect your business from threat actors. But what are the differences, and when should you use one over the other? |
Threat
Vulnerability
|
|
|
|
2022-04-12 20:29:19 |
What Is a Social Engineering Attack? (lien direct) |
Most organizations use security scans to protect their data and employees from threat actors, however, a simple scan may not be updated or thorough enough to catch everything. Additionally, a scan doesn't account for one major vulnerability within an organization: its employees. |
Threat
Vulnerability
|
|
|
|
2022-02-10 19:06:44 |
What Is Included in a Vulnerability Assessment Report? (lien direct) |
To keep bad actors at bay, most businesses will have their system software regularly scanned for high-level security vulnerabilities. Sometimes after a scan, a cyber security professional assesses the results. These professionals often weed out false positives and offer recommendations for improving your defenses in the form of a vulnerability assessment report (VA report). |
Vulnerability
|
|
|
|
2021-12-21 19:53:25 |
What Is a Security Vulnerability Assessment? (lien direct) |
When it comes to online security, you want to find the issues before cyber criminals figure it out for you. Penetration tests, or pentests, are annual tests that use social engineering and other rigorous testing methods to find exploitable vulnerabilities in your systems. However, what about the months, or years, in between full-scale pentests? |
Vulnerability
|
|
|