Red Team Assessment Phases: Establishing Foothold and Maintaining Presence

| | Penetration Testing
In the previous phase, the goal was to gain initial access to the target network. The focus of this phase is to expand this access to the level necessary for achieving the objectives of the... Go on to the site to read the full article ... Read More

Red Team Assessment Phases: Gaining Access

| | Penetration Testing
This phase is the first of several where the red team actively interacts with the target’s environment. Some of these phases tend to blend together, as the line between gaining initial access and... Go on to the site to read the full article ... Read More

Red Team Assessment Phases: Target Identification

| | Penetration Testing
The third phase of a red team assessment is target identification. In this phase, the red team moves from general information collected about the target to detailed information and potential plans... Go on to the site to read the full article ... Read More

Red Team Assessment Phases: Reconnaissance

| | Penetration Testing
The second phase of a red team assessment is reconnaissance. In this phase, the red team attempts to collect information relevant to the assessment while keeping as low of a profile as possible. In... Go on to the site to read the full article ... Read More

Red Team Assessment Phases: Overview

| | Penetration Testing
Computer systems and networks contain valuable information, and hackers are out there trying to steal that data. This has led to the development of the red team assessment, a test to help an... Go on to the site to read the full article ... Read More

The Regulatory Impacts of Phishing Attacks

| | Phishing
Phishing attacks can be a daily threat to everyone both in their personal and professional lives. The fact that a successful phishing attack can compromise an account and force a password reset is... Go on to the site to read the full article ... Read More

LetsEncrypt: The Free HTTPS Certificate Generator [product overview]

| | General Security
LetsEncrypt is a free way to set up your websites to use HTTPS, or Hypertext Transfer Protocol Secure. In this article, we will explore the benefits of doing so and how to accomplish it using... Go on to the site to read the full article ... Read More

A Brief Introduction to the OpenVAS Vulnerability Scanner

| | General Security
What Is the OpenVAS Vulnerability Scanner? The Open Vulnerability Assessment System (OpenVAS) is a vulnerability scanner maintained and distributed by Greenbone Networks. It is intended to be an... Go on to the site to read the full article ... Read More

The Dangers of HTTPS and Extended Validation Certificates

| | General Security
Extended Validation (EV) certificates are an advanced type of digital certificate that websites use to enable HTTPS. Their purpose is to help fight phishing sites by allowing the official websites of... Go on to the site to read the full article ... Read More

Trend Micro: Endpoint Encryption Data Protection Solution [product overview]

| | General Security
With the growing number of data breaches and the increased penalties associated with them, the need for an enterprise-wide solution for data encryption is essential. However, according to a survey by... Go on to the site to read the full article ... Read More
Loading...