Sometime way back in 1992:
“Marco! Clean this pigsty you call a room up!’’
“Moooom! A little privacy please!!!’’
A little privacy. Without even really understanding what it was, my teenage self needed and felt entitled to it.
Often enough, we encounter situations, where the understanding of differences between Vulnerability Assessment & Penetration Testing is blurred, leading to less optimal decision making and creating additional obstacles for the […]
You might be wondering how to choose the right pen testing strategy? We are here to help you figure that out!
Virtual Guardian invites the audience “behind their shield” every third Thursday to reveal the latest on offense and defense in the cyberverse.
Information security is certainly a growing concern for IT managers and is taking up an increasing share of technology budgets. But how do you identify the most appropriate and optimal […]
The largest enterprises with the most sophisticated IT teams in the world are now starting to adopt SaaS applications. They now see that SaaS is not just a new deployment […]