Why should I let a hacker into my computers?
That’s an absolutely fair question. I don’t want to techno-babble at you, it doesn’t help with this question. Rather, let’s answer this by analogy. At night, you check to make certain that your doors...
View ArticleCommercial Honeypots – PenTest Extra 6/2012
[no_access] [download id=”195″ format=”4″] [ym_user_is_not package=”1″][ym_login register_text=”Register” redirect=”/pentest-extra-6_2012-honeypots/” lostpassword_text=”Lost...
View ArticleHow Biometrics Enhance Our Enterprise Security – PenTest Regular 10/12
[no_access] [download id=”201″ format=”4″] [ym_user_is_not package=”1″][ym_login register_text=”Register” redirect=”/pentest-regular-1012/” lostpassword_text=”Lost password?”][/ym_user_is_not]...
View ArticleBasics of Pentesting – PenTest StarterKit 02/13 TEASER
Dear PenTest Readers! We are pleased to present you the TEASER of the second issue of PenTest StarterKit. Last time our authors explained in their articles how to begin a career as pentester. This time...
View ArticleCyber Security in Oil and Gas 2014
Cyber Security in Oil and Gas 2014 27-29 January 2014 | Abu Dhabi, UAE The Cyber Security in Oil and Gas 2014 is focused on the critical subject of defense against the cyber-attacks on the energy...
View ArticlePentesting high security environments
Joe McCray – Big Bang Theory https://www.hacktivity.com/ This presentation focuses on pentesting high security environments, new ways of identifying/bypassing common security mechanisms, owning the...
View ArticlePenTest: ISO 27001: Real Life Practical Advice from Top Security Experts
Dear PenTest Readers, Is the ISO 27001 standardization equally efficient in practice and theory? Is this time and money requiring standardization worth sacrificing? Why the human factor and the ISO...
View Article