8 Results for:Penetration testing

  • Filter by: 

Hacker-Powered Pen Tests and the Power of More

sponsored by HackerOne Published: 06 Mar 2019 White Paper

Like traditional penetration testing, a hacker-powered pen test like the HackerOne Challenge program runs for a fixed time period. But it also brings to bear the skills of up to thousands of hackers who probe your ...

View Now

Proactive Security: Software vulnerability management and beyond

sponsored by ComputerWeekly.com Published: 17 May 2019 eGuide

In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

View Now

Evaluating a Penetration Testing Company

sponsored by InteliSecure Published: 08 Oct 2019 White Paper

Regardless of your company’s reasons for requiring pen testing, a primary factor in your test’s success is picking a provider who is capable of meeting your company’s specific goals. So where do you start? Use this...

View Now

CW ANZ: Cyber security plan bears fruit

sponsored by ComputerWeekly.com Published: 13 Jul 2017 Ezine

Australia's Cyber Security Strategy has made significant headway over the past year, but the jury is still out on its long-term impact. In this month's CW ANZ, we take a look at the progress of Australia's national...

View Now

Meet PCI DSS Requirements

sponsored by HackerOne Published: 04 Jun 2019 Webcast

Many organizations are limited by traditional penetration tests. A better approach is needed to discover real-world vulnerabilities while meeting penetration testing requirements set forth by PCI-DSS. In this ...

View Now

5 Techniques to Protect Against a SQL Injection Attack

sponsored by Alert Logic Published: 29 Aug 2018 eBook

SQL Injection, the hacking technique that has caused havoc since first being identified in 1998, is still being used on a regular basis. Download this e-book for 5 preventive techniques to get ahead of ...

View Now

Under the Hoodie 2019

sponsored by Rapid7 Published: 09 Jan 2020 Resource

Due to the sensitive nature of its findings, penetration testing is a relatively unknown, yet critical, piece of the information security puzzle. This study by Rapid7 was an effort to demystify what goes on in a ...

View Now

Open Source Network Security Tools for Beginners

sponsored by AT&T Cybersecurity Published: 10 May 2019 Resource

In this white paper, get an overview of some of the leading open source tools as well as tips on how to use them for network security.

View Now