Here are some pieces I’ve written recently on determining just how “fit” your network and application environment really is. Whether you’re an IT auditor, penetration tester, IT admin, or security consultant, there’s some stuff for you:
How to perform a (next-generation) network security audit
Don’t overlook details when scoping your Web application security assessments
Top gotchas when performing email phishing tests
How to take a measured approach to automated penetration testing
Five steps for improving an authenticated vulnerability scan
Next-generation tools for next-generation network security
Look for these security flaws in your messaging environment
How do you know when a security vulnerability matters to your business?
My other information security content I’ve developed over the years is available on my website at www.principlelogic.com/resources. Enjoy…here’s to the great 2014 we’ve had – I’m so blessed to work in such an amazing field!