Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Penetration Testing
You are here: Home \ Penetration Testing
Pentest Exploits
Posted on Wednesday, January 2nd, 2019 by
We’ve put together some of today’s most common pentest exploits and offer guidance on how to remediate them effectively to strengthen your organization's cybersecurity posture and better manage your risk. Common pentest exploits include: 1. Password Vulnerabilities, 2. OS and Endpoint Application Vulnerabilities, 3. Misconfiguration Vulnerabilities, 4. ...

Topics: Penetration Testing, Tips & Tricks, Uncategorized, Vulnerability Assessment

keys - pentest tools
Posted on Tuesday, October 9th, 2018 by
Pentesters use a variety of tools but what are the most commonly-used ones? Here is a list of top 10 tools pros can’t work without.

Topics: Penetration Testing

Pentest vs VA
Posted on Tuesday, September 18th, 2018 by
Companies and people are often misinformed or misguided as to what the differences are between a penetration test and a vulnerability assessment. In many cases, there are upper-level executives which ask for a penetration test but really want a vulnerability assessment, and vice-versa. In these scenarios, the assessment is sometimes improperly labeled which can be very misleading.

Topics: Penetration Testing, Vulnerability Assessment

choose right pentesting vendor
Posted on Tuesday, September 11th, 2018 by
How do you choose the right penetration testing company? What do you need to consider before engaging an external provider? And how can you trust this provider to perform the penetration testing engagement to your satisfaction and in accordance with your business needs?

Topics: Penetration Testing

Posted on Tuesday, September 4th, 2018 by
Did an 11 year old hack a state election website? Are voting machines easy prey for hackers? And does any of this matter to IT professionals charged with securing corporate networks from cyber attacks?The answers to the above questions are: no, yes and YES!

Topics: Penetration Testing

Posted on Thursday, August 30th, 2018 by
In general, security should be looked at as striking the balance between access and control. Too much access may disclose too much information; too much control could be a burden. Security should be a regular part of your best practices to ensure the success of your business.

Topics: Control Assessment, Controls, Cybersecurity Posture, Managed Security Services, Penetration Testing, Risk management, Security Practices, Threat Risk Assessments, Vulnerability Assessment

Puzzle head what to know before conducting a pentest
Posted on Tuesday, August 21st, 2018 by
A penetration test, or pentest, is a process where a benign ethical hacker conducts scans, probes and attacks on a network or application to uncover vulnerabilities. In many ways it's like going to the doctor. You need a checkup, we all do. The frequency of the checkup will vary from person to person depending on health, age, medical history and much more. A pentest can be very similar in the sense that there is a third-party team of hackers or individual hacker performing an assessment on your network or application in order to determine its current security posture.

Topics: Penetration Testing

pentest-resources
Posted on Tuesday, February 27th, 2018 by
Curious about how to stay up to speed with Penetration Testing? We’ve gathered 10 useful resources vetted by Hitachi Systems Security’s own Penetration Testers that will help you keep up with the rapidly evolving landscape of ethical hacking.

Topics: Penetration Testing

Cybersecurity Talent Shortage
Posted on Tuesday, January 2nd, 2018 by
We currently experience a shortage between 1 million and 1.8 million qualified people in the physical and cyber security industry. Today’s CISOs struggle between choosing to build their own IT security dream teams or outsourcing their security to a trusted security service provider. Now the question is, if we put 1 million people in a college and train them for 4-5 years every year for 20 years, would there be such a talent shortage? Did we miss the window to get that done?

Topics: CISO, Penetration Testing, Risk management

equifax data breach
Posted on Wednesday, October 4th, 2017 by
Equifax slow response causes public outcry. What is the impact of the Equifax hack? What practices to follow in order to avoid catastrophic loss?

Topics: Control Assessment, Incident Response, Managed Security Services, Penetration Testing, Security Practices, Threat Risk Assessments, Vulnerability Assessment

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More