Vulnerability scanning – Defining a scanning approach
In my working life I have had various roles as security consultant. One of these roles was working in an
Read moreIn my working life I have had various roles as security consultant. One of these roles was working in an
Read moreLast month I started working on something that feels extremely counter-intuitive. Building targets for a hacking ‘Capture The Flag‘ event.
Read moreVulnerabilities can be found in all types of software such as end-user applications, middle-ware. Vulnerabilities are also found in operating
Read moreWhen working with scanning tools, you must first determine what type of scanner you are working with. There are several
Read moreIn my working life I have had various roles as security consultant. One of these roles was working in an
Read moreVulnerability management (processes) and therefore vulnerability scanning (techniques) are a requirement for any organization that takes security serious. In my
Read moreAs part of my pursuit for more knowledge in the information security field, I visited the InfoSecurity.nl Conference in Utrecht,
Read moreInformation security is traditionally focused around the CIA triad and the three core elements of People, Process and Technology. The
Read moreWith the pending deadline due to the change of ISO27001 from the 2005 version to 2013 two years ago, the
Read moreA couple of weeks ago I was discussing the nature of my work with a friend. The primary topic was
Read more