17 pen testing tools the pros use
We asked a few professional hackers for their thoughts on the best penetration testing tools. Here's what they said.
By David Geer | 14 Sep | Read more
We asked a few professional hackers for their thoughts on the best penetration testing tools. Here's what they said.
By David Geer | 14 Sep | Read more
CSO explores the deep web, dwell time, and their roles in the balance of power in cybersecurity, pointing up defensive moves such as employing hackers and improving the effectiveness of employee education about social engineering / phishing in order to better arm personnel.
By David Geer | 07 Jul | Read more
An expert’s eye view into how top DDoS protection cloud services perform on many levels.
By David Geer | 24 May | Read more
If you want to test backup and restore procedures with your eyes wide open, consider these factors and tips.
By David Geer | 29 Mar | Read more
Attackers will thank you for enabling them to bypass firewalls and VPNs by allowing infected laptops to send hostile packets through both into your network.
By David Geer | 11 Feb | Read more
A security workforce shortage and other factors compound the problem of misconfigured security tools. There are solutions.
By David Geer | 29 Jan | Read more
By building intelligent IDS/IPS into an app from the ground up, an enterprise can enable apps to be self-defending against any malicious use of their capabilities.
By David Geer | 05 Jan | Read more
There’s not enough good endpoint protection to go around for every endpoint type. Using protections that do exist to the fullest takes extra care.
By David Geer | 11 Dec | Read more
Attackers are swapping, selling, and associating increasing stores of linked PII and credentials to run deeper, broader, and more stealthy information invasions.
By David Geer | 08 Dec | Read more
Patching pressures don’t make Linux ransomware any easier to take.
By David Geer | 04 Dec | Read more
No transformers robots, no nukes, just real EMPs from long-range missiles or targeteddDrone attacks.
By David Geer | 17 Nov | Read more
If he’s the man-in-the-middle, why are you stuck between a rock and a hard place?
By David Geer | 28 Oct | Read more
That’s what users are saying, shoved down their throats, with many users still having issues with the unwanted Windows 10 OS.
By David Geer | 21 Oct | Read more
Are you the type? Insider archetypes map and model personalities and behaviors that could be clues to the next attack on your business.
By David Geer | 01 Oct | Read more
They won’t knock on the front door bearing gifts and treats, but sooner or later, you’ll know these goons have arrived as you and your organization foot the bill for their good time.
By David Geer | 19 Aug | Read more