How to Get Less Findings on Your Next Internal Penetration Test
LBMC Information Security’s Stewart Fey highlights a popular method that both pen testers and hackers alike use to gain a foothold on your internal network which typically leads to a full compromise/hack.
Attaining PCI Compliance With Vulnerability Scanning
Most companies with PCI compliance obligations are regularly performing their own internal vulnerability scans and reviewing the results. One important requirement with PCI vulnerability scanning control is performing quarterly scans.