Remove Compliance Remove Data Remove Knowledge Base Remove Systems administration
article thumbnail

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

The Last Watchdog

LW: Did compliance with privacy regulation factor in? Instead, it is still typical for companies to want to stampede over to keeping data private, without realizing that it really comes back down to adhering to some very fundamental security principles. That’s just not the case anymore. Stanger: Yes.

IT 133
article thumbnail

How to Perform a Vulnerability Scan in 10 Steps

eSecurity Planet

The scanner will actively explore the target, identifying potential weaknesses and gathering pertinent data for study. If the changes are considerable, it is critical to update the scanning tool’s vulnerability knowledge base with the most recent information.

article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

That is centered around providing the information that attacker would provide, but then adding in unique data sets. One of those data sets is a product registry that we have, where vendors are working with us to define their capabilities as they relate to attack. Often this is for compliance and regulatory needs.