assessment
Agreeing on the scope of a security assessment, such as a penetration test, is easier said than done. Define the scope too...Read more
There are many types of information security assessments. These projects typically look for security weaknesses, so that...Read more
Tactics that incorporate social engineering can be highly effective at bypassing security controls. Perhaps we are...Read more
It’s hard to avoid leaking potentially sensitive information about the employer in one’s resume. Explaining...Read more
There are several reasons why information security recommendations are ignored. When I outlined the rationale for this...Read more
There is surprisingly little information online about creating good information security reports. You’ll easily find...Read more
Text-sharing “pastebin” sites, such as Pastebin and Pastie are a popular repository of compromised data. Keeping an eye...Read more
If you've ever performed a security assessment, you probably know the frustration of seeing your earnest recommendations get...Read more
Most of the people whom you envision as the audience for your security assessment report won't read the whole document. But...Read more
Not all information security assessment reports equal. Many present irrelevant details and are tedious to read. They...Read more