Reference: Acunetix Authenticated testing can add a lot of value to your overall security assessment results. You’ll find a lot more missing patches, weak share permissions, and general misconfigurations. But before you start testing with authentication, there are a few things you need to know: Authenticated scans will give you give you a ton of […]
Articles Tagged: best practices
Desktop Security Best Practices
An excellent desktop security best practices document from CCNY at CUNY: https://www.ccny.cuny.edu/sites/default/files/it/upload/Desktop-Security-Best-Practices.pdf
Tools That Should Be In Your Infosec Toolbox
Reference: http://www.proactiverisk.com/tools/ DISCLAIMER The following list of URL’s are a collection of resources broken down by category. The resources are listed numerically in no particular order except for tracking purposes Breach Laws State Breach Laws Hardening Guides Windows: CIS Security Benchmarks for Windows NSA Security Configuration Guides for Windows Microsoft Baseline Security Analyzer Microsoft PC Security Secunia Personal […]