A Passage to Penetration Testing

January 3, 2019

What Is Penetration Testing? A penetration test or ‘pen test’ is the process of evaluating the security infrastructure within a controlled environment to safely attack, identify, penetrate and exploit vulnerabilities. These vulnerabilities may exist in network, applications, database, processes, services, operating systems, server, etc. These vulnerabilities may exist due to negligent acts by the end-user or improper configurations. Penetration testing is also valuable while defining the processes, verifying the end-user performance, and validating the effectiveness of defensive mechanisms.

Spotlight

Broadweb

BroadWeb is a market leader in network content security technology dedicated to creating products that enables the protection on application-layer level, including intrusion detection and prevention, malware protection, and information security enforcement. BroadWeb also focuses on the development of application-centric classification in order to increase visibility into user behaviors and control impacts of bandwidth-consuming applications. To enable policy management at the application behavior level, BroadWeb provides a complete solution based on sophisticated deep packet inspection, traffic classification, and bandwidth management technologies.

OTHER WHITEPAPERS
news image

Recommended Criteria for Cybersecurity Labeling of Consumer Software

whitePaper | February 4, 2022

Software is an integral part of life for the modern consumer. Nevertheless, most consumers take for granted and are unaware of the software upon which many products and services rely. From the consumer’s perspective, the very notion of what constitutes software may even be unclear. While enabling many benefits to consumers, that software that is, software normally used for personal, family, or household purposes can also have cybersecurity flaws or vulnerabilities which can directly affect safety, property, and productivity.

Read More
news image

Cyber Security After the Pandemic

whitePaper | April 29, 2021

The cyber security industry has faced two major sets of challenges over the last twelve months. The attacks and exploits affecting Solar Winds, Accellion, Microsoft and their customers have focused attention on supply chain risk, but the impact of the coronavirus pandemic has been felt more broadly across cyber security domains and disciplines.

Read More
news image

Cloud-Native Ransomware – How attacks on availability leverage cloud services

whitePaper | December 13, 2022

Ransomware is a financially motivated crime with the goal of inhibiting business systems and obtaining a ransom payment. Historically, ransoming data residing in traditional on-premises enterprise workloads and government systems have resulted in ample financial gain for assailants using ransomware attacks.

Read More
news image

Webex App Security Cloud Collaboration Security Technical Paper

whitePaper | November 24, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. The Webex App is a client application that connects to this platform and provides a comprehensive tool for teamwork. Users can send messages, share files, make calls, and meet with different teams, all in one place. This security technical paper provides an overview of the security features of Webex App running on Windows, Mac, iOS, Android, Linux, ChromeOS, and Web.

Read More
news image

2022 Cybersecurity Predictions

whitePaper | June 27, 2022

At the end of every year, our experts put their heads together to anticipate and prepare for what’s to come next in the world of cybersecurity. We retrospect on the months past, and analyze impactful developments, breaches, and tactics. We package the outputs of this process for IT leaders, so they, too, can anticipate and prepare.

Read More
news image

GE Gas Power Cybersecurity Portal

whitePaper | October 31, 2022

GE Gas Power has developed a product security program based on industry-leading standards, encompassing end-toend cybersecurity through the entire software development lifecycle in conjunction with engineering, sourcing, and vulnerability and incident response. As part of this program, we have also created the Gas Power Cybersecurity Portal, a central, publicly available resource regarding cybersecurity at GE Gas Power.

Read More

Spotlight

Broadweb

BroadWeb is a market leader in network content security technology dedicated to creating products that enables the protection on application-layer level, including intrusion detection and prevention, malware protection, and information security enforcement. BroadWeb also focuses on the development of application-centric classification in order to increase visibility into user behaviors and control impacts of bandwidth-consuming applications. To enable policy management at the application behavior level, BroadWeb provides a complete solution based on sophisticated deep packet inspection, traffic classification, and bandwidth management technologies.

Events