In these articles, I've summarized my advice on security assessment practices.
This cheat sheet presents recommendations for creating a strong report as part of an information security assessment project.
This 2-page cheat sheet offers tips for reviewing security architecture of complex Internet applications.
Budget, time and staff limitations require companies to be selective about information security spending. This article presents key steps that outline what to look for.
This article describes how to test for client-side vulnerabilities during a security assessment.
This article explains how to incorporate social engineering into information security assessments.
This article describes the various types of information security assessments, and offers tips for deciding which assessment is right for your situation.
This cheat sheet offers tips for planning, issuing and reviewing Request for Proposal (RFP) documents for information security assessments.
Copyright © 1995-2013 Lenny Zeltser. All rights reserved. RSS Feed.
The information on this site does not necessarily represent positions or opinions of my employer.