article thumbnail

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

The Last Watchdog

LW: Did compliance with privacy regulation factor in? So, for instance, we can walk through the benefits of sending, say a system administrator or help desk technician, through CompTIA CertMaster Learn , a self-paced eLearning platform that helps prepare them to earn the CompTIA Security+ certification. Stanger: Yes.

IT 103
article thumbnail

How to Perform a Vulnerability Scan in 10 Steps

eSecurity Planet

If the changes are considerable, it is critical to update the scanning tool’s vulnerability knowledge base with the most recent information. Develop and implement suitable remediation procedures in collaboration with key stakeholders such as system administrators, network engineers, and security teams.

article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

But once they get in, how do they operate, and a lot of them just use the same tools that your system administrators would use to move around the environment. Because those are the same behaviors that real users real administrators are using. Often this is for compliance and regulatory needs. And it's challenging, right?