What you need to know about performing authenticated network security scans

Reference: Acunetix Authenticated testing can add a lot of value to your overall security assessment results.  You’ll find a lot more missing patches, weak share permissions, and general misconfigurations.  But before you start testing with authentication, there are a few things you need to know: Authenticated scans will give you give you a ton of […]

Read More

Tools That Should Be In Your Infosec Toolbox

Reference: http://www.proactiverisk.com/tools/ DISCLAIMER The following list of URL’s are a collection of resources broken down by category. The resources are listed numerically in no particular order except for tracking purposes Breach Laws State Breach Laws Hardening Guides Windows: CIS Security Benchmarks for Windows NSA Security Configuration Guides for Windows Microsoft Baseline Security Analyzer Microsoft PC Security Secunia Personal […]

Read More