Business IT Teams will almost certainly be aware of the importance of finding security vulnerabilities within the company’s
Krypsys
Five Top Wifi Security Tips
Wireless technology can make intrusion attempts easier because the attacker does not need physical access to the network
You Can’t Just Rely on Your Anti-Virus Solution
An antivirus solution is now a standard fixture in the IT security arsenal of any serious IT shop. It should allow the system to scan static files on disk and also programs that are resident in memory for suspected malicious activity. This is clearly good practice and is, indeed, a basic essential, but attackers that …
Does ISO 27001 Require Penetration Testing?
We are often asked whether vulnerability assessment or penetration testing are required for ISO 27001 compliance.
So You Need to Conduct a Firewall Review
Firewall audits receive a lot of attention nowadays due to standards such as PCI-DSS, ISO 27001 and SOX and HIPAA
Social Engineering Testing and PCI
The term social engineering refers to the practice of attempting to compromise a system through the manipulation of those who
PCI Segmentation Checks – What’s Required
PCI DSS requires that network segmentation controls are penetration tested and that the methods used are operational
Application Penetration Testing for PCI
When considering application penetration testing for PCI, any software written by your organisation or written specifically for it,
PCI Penetration Testing – How to Define The Scope
Cardholder Data Environment
The PCI DSS defines the cardholder data environment (CDE) as follows: