Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: Choosing an Independent Penetration Testing Firm
Feb 07 2013 03:38AM
Eric Schultz (fire0088 gmail com)
First, you'll want to create rules of engagement - a list of attack
methods you do and dont want tested (ie spear phising, physical
penetration, social engineering). Also note if you want focus on
certain components of your infrastructure, or things you dont feel
confident about. Essentially, all th...
[ more ]
Copyright 2010, SecurityFocus