| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Conducting regular security assessments on the organizational network and
computer systems has become a vital part of protecting information-computing
assets. Security assessments are a proactive and offensive posture towards
information security as compared to the traditional reactive and defensive
stance normally implemented with the use of Access Control-Lists (ACLs) and
firewalls. Too effectively conduct a security assessment so it is beneficial to an
organization, a proven methodology must be followed so the assessors and
assesses are on the same page. This presentation will evaluate the benefits of credential scanning, scanning
in a virtual environment, distributed scanning as well as vulnerability
management. Kellep Charles (@kellepc) is the creator and Executive Editor of
SecurityOrb.com (@SecurityOrb), an information security & privacy
knowledge-based website with the mission to share and raise awareness of the
motives, tools and tactics of the black-hat community, and provide best
practices and counter measures against malicious events.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast