The GNU Radio Foundation recently teamed up with the UC Berkeley SETI Research Center and the Breakthrough Listen project to sponsor the SETI RF Hackathon, an unprecedented wireless hackathon event. Encompassing the ultimate in Internet-of-Things …
Why You Still Need Pen Testing in 2019
Why do you still need pen testing in 2019? Quite simply, because you need a secure network – and your network is a moving target. A penetration test can give you a snapshot of your overall security posture, along …
Vulnerability Assessments Overview: An Essential Component to Your Cyber Security Program
In this week’s blog we’ll share a vulnerability assessments overview and discuss how they can help you find holes in your security programs before malicious hackers can take advantage of …
The Beginner’s Guide to External Penetration Testing Reconnaissance
External penetration testing reconnaissance is a critical first step in a professional security assessment. By using the same methods and resources that attackers use to get into networks, along with open …
Why Penetration Testing and Assessments Should Include Real-World Scenarios
Penetration testing and other technical assessments are designed to be practical, useful exercises to examine your security defenses and look for holes in your network or applications. There’s real value in performing these …
The Skills and Qualifications Every Successful Penetration Tester Must Have
Any time I’m asked to speak about my experience in the cyber security field, whether I’m at a trade show or speaking to candidates interested in breaking into the industry, …