Vulnerability scanning – types of scanners and their purpose
When working with scanning tools, you must first determine what type of scanner you are working with. There are several
Read moreWhen working with scanning tools, you must first determine what type of scanner you are working with. There are several
Read moreVulnerability management (processes) and therefore vulnerability scanning (techniques) are a requirement for any organization that takes security serious. In my
Read moreAs part of my pursuit for more knowledge in the information security field, I visited the InfoSecurity.nl Conference in Utrecht,
Read moreInformation security is traditionally focused around the CIA triad and the three core elements of People, Process and Technology. The
Read moreWith the pending deadline due to the change of ISO27001 from the 2005 version to 2013 two years ago, the
Read moreA couple of weeks ago I was discussing the nature of my work with a friend. The primary topic was
Read more