article thumbnail

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

The Last Watchdog

Instead, it is still typical for companies to want to stampede over to keeping data private, without realizing that it really comes back down to adhering to some very fundamental security principles. Instead, getting trained and certified gives them a knowledge base to and contract out that expertise when their company needs it.

IT 103
article thumbnail

How to Perform a Vulnerability Scan in 10 Steps

eSecurity Planet

The scanner will actively explore the target, identifying potential weaknesses and gathering pertinent data for study. If the changes are considerable, it is critical to update the scanning tool’s vulnerability knowledge base with the most recent information.

article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

That is centered around providing the information that attacker would provide, but then adding in unique data sets. One of those data sets is a product registry that we have, where vendors are working with us to define their capabilities as they relate to attack. And so then it becomes Okay, well, how can you defend against this?