What you need to know about performing authenticated network security scans

Reference: Acunetix Authenticated testing can add a lot of value to your overall security assessment results.  You’ll find a lot more missing patches, weak share permissions, and general misconfigurations.  But before you start testing with authentication, there are a few things you need to know: Authenticated scans will give you give you a ton of […]

Read More

What is a vulnerability assessment?

A Vulnerability Assessment is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure. Vulnerability assessments are performed by using an off-the-shelf software package, such as Nessus or OpenVas to scan an IP address or range of IP addresses for known vulnerabilities. In addition, vulnerability analysis can […]

Read More