Other content in this Stream
Cloud Apps - Penetration Testing for Providers and Customers
Please, join Matt Wilgus and Josh Tomkiel from Schellman's Threat and Vulnerability Assessment team, as they cover the ins and outs of performing a penetration test of cloud based services.
EC-Council Brings A New Range Of Real World Challenges
EC-Council brings a new range of real world challenges that will not only test your Pen-testing skills but guarantees you an experience that is not built for the weak hearted.
The Why, How & Top Benefits
Best Practices When Implementing Web Application Scanning into an SDLC
Web application scanning, a type of dynamic application security testing (DAST), is an important component for organizations looking to provide a secure online offering to their clients.
Phishing: Season is Open All Year Long
Employees are one of the weakest links in any business’ security defenses, especially if there is a lack of awareness about criminal attacks that are designed to obtain sensitive...
Don’t Forget Your Internal Pen Tests
Many of the requests that we receive are limited in scope to Internet facing assets. A true understanding of the threats facing your networks requires a complete evaluation of all...
5 Questions with Community Speaker - Jacob Ansari
Originally published at blog.pcisecuritystandards.org In this post, we get insights from Jacob Ansari, Manager at Schellman & Company, LLC He will present“Hunting Paper Tigers: A...
The Panama Papers, Mossack Fonseca and the Writing on the Wall
The release of details contained in the Panama Papers will be one of the biggest news stories of the year. The number of high-profile individuals implicated will continue to grow as teams comb...
FedRAMP and PCI – A Comparison of Scanning and Penetration Testing Requirements
Overview In the last 30 days, the FedRAMP Program Management Office (PMO) has published guidance for both vulnerability scanning and penetration testing. The updated guidance comes on the heels...
DevOps, Security, And The Software Development Life Cycle
A walk-through security and compliance implications for modern SDLC, with a heavy attention on DevOps.
Your Penetration Testing is Complete, Now What?