guides

16 01, 2016

5 Reasons to Phish your Employees

By |2022-05-04T09:57:42+02:00januar 16th, 2016|Categories: guides|Kommentarer er skrudd av for 5 Reasons to Phish your Employees

Social engineering and phishing are often the primary means by which attackers infiltrate modern corporate networks. By using this non-technical method that relies heavily on human interaction, attackers try to trick employees into providing them with valuable information, or taking action needed for making a successful intrusion. This makes social engineering one of today’s [...]

13 11, 2015

OWASP ASVS – Application Security Verification Levels

By |2017-01-24T18:40:28+02:00november 13th, 2015|Categories: guides|Kommentarer er skrudd av for OWASP ASVS – Application Security Verification Levels

In this blog post we will have a look at the OWASP Application Security Verification Standard (ASVS) levels. OWASP ASVS is a list of application security requirements or tests that can be used by architects, developers, testers, security professionals, and even consumers to define what a secure application is. If you are not familiar [...]

6 11, 2015

Introduction to the OWASP Application Security Verification Standard (ASVS) 3.0

By |2017-01-31T19:48:41+02:00november 6th, 2015|Categories: guides|Kommentarer er skrudd av for Introduction to the OWASP Application Security Verification Standard (ASVS) 3.0

Application Security Verification Standard (ASVS) is a list of application security requirements or tests that can be used by architects, developers, testers, security professionals, and even consumers to define what a secure application is.In October 2015 version 3.0 of the standard was released, and the requirements set to define a secure application have been [...]

25 10, 2015

How to Prepare for a Security Test

By |2023-05-05T13:13:30+02:00oktober 25th, 2015|Categories: guides|Kommentarer er skrudd av for How to Prepare for a Security Test

A security test can provide your organzation with multiple benefits. For example, it will uncover if your security countermeasures actually resist external threats, and how well they respond in case of an attack. Computer attacks are a risk for all kinds of companies, no matter what size they have. If you follow this checklist [...]

20 09, 2015

How to Choose Your Security Testing Provider

By |2023-05-05T13:15:29+02:00september 20th, 2015|Categories: guides|Kommentarer er skrudd av for How to Choose Your Security Testing Provider

If you want to simulate a cyber attack and understand the consequences of vulnerabilities being exploited, you should perform a penetration test. Such a test will tell you whether it is possible to break into the company’s network and achieve specific goals. Make sure to check out the following list on how to choose [...]

Go to Top