Organisations that need information systems infrastructure for managing data, business procedures, activities and client relationships must have robust IT security programs in place. Since they have data stored and processed …
penetration testing
-
-
A red team security analysis helps find as many vulnerabilities as possible in a system. It generally involves lateral thinking, trying various attacks and considering how to bypass certain defences. …
-
Network enumeration is a process which creates an active connection with the target hosts for discovering potential attack vectors, or for further exploiting the system. It is used to gather …
-
Pen testing is a challenging job. If you ask an experienced pen tester about their work, they will tell you about the endless hours they spend doing their jobs, before …
-
For many businesses, it’s not until after they suffer from a security breach that web security becomes a priority. An effective web security approach must be defensive and proactive. Let’s …
-
Baiting is a form of social engineering that relies on the greed or curiosity of the victim. It’s similar to phishing attacks in many ways. However, what makes it different …
-
A network intrusion attack is an unauthorised attack on a digital network that can occur in various ways. It often involves stealing valuable network resources and jeopardising the security of …
-
Cross-site scripting (XSS) attacks continue to plague web applications as one of the most prevalent security vulnerabilities in the digital landscape. According to the OWASP Top 10, XSS consistently ranks …
-
What is Tailgating? Tailgating is a social engineering attack. In simple words, tailgating is when an unauthorised person gets access to a restricted area by following an authorised person. People …
-
A build review evaluates the configuration of a device, operating system and its settings against certain industry standards. It plays an important role in creating a strong security posture for …