Sometime way back in 1992:
“Marco! Clean this pigsty you call a room up!’’
“Moooom! A little privacy please!!!’’
A little privacy. Without even really understanding what it was, my teenage self needed and felt entitled to it.
Often enough, we encounter situations, where the understanding of differences between Vulnerability Assessment & Penetration Testing is blurred, leading to less optimal decision making and creating additional obstacles for the offensive team to deliver the expected result. This blog and mind map is, in fact, an attempt to explain the purposes and differences between different security […]
You might be wondering how to choose the right pen testing strategy? We are here to help you figure that out!
Virtual Guardian invites the audience “behind their shield” every third Thursday to reveal the latest on offense and defense in the cyberverse.
Information security is certainly a growing concern for IT managers and is taking up an increasing share of technology budgets. But how do you identify the most appropriate and optimal investments in information security? What actions should be undertaken in priority? Step 1: Establish the information security posture In order to assess the information security […]
The largest enterprises with the most sophisticated IT teams in the world are now starting to adopt SaaS applications. They now see that SaaS is not just a new deployment model. With faster innovation cycles and all customers running the same version, SaaS applications are quickly becoming the best applications in every category of IT. […]