Why Simulating an Insider Attack Is Important??
The importance of assessing an organization’s vulnerability to attack from the inside is virtually self-evident. With the exception of the
Read moreIT Security
The importance of assessing an organization’s vulnerability to attack from the inside is virtually self-evident. With the exception of the
Read moreYou might assume that protecting a company’s informational assets from a physical intrusion is covered under its existing security measures,
Read moreAnyone who has taken an information security class in the past ten years has probably heard the “crunchy on the
Read moreHardening your environment to withstand SEAs, especially targeted ones, is more a matter of training than a traditional security control.
Read moreIt’s one thing to send an e-mail to or chat with someone online during a SEA, but it’s quite another
Read moreIt is important to discuss with your client your intention to conduct social engineering attacks, whether internal or external, before
Read moreSocial engineering attacks cover a wide range of activities. Phishing, for instance, is a social engineering attack (SEA). The victim
Read moreThere are three basic types of vulnerability disclosures: full disclosure, partial disclosure, and nondisclosure. Each type has its advocates, and
Read moreThe Securely Protect Yourself Against Cyber Trespass (SPY Act) was passed by the House of Representatives, but never voted on
Read moreSeveral years ago, Congress determined that the legal system still allowed for too much leeway for certain types of computer
Read more