Is your data an easy target for social engineering hacks? For a process called ‘penetration testing’ a credit bureau recently hired a security company (run by a well-known former cybercriminal skilled in a variety of break in techniques) – to devise ways to breach security in their IT systems, to look for openings in…

Todd Howe, Linux Systems Engineer Traditionally, specialists in information security divide into two opposing camps — the Red Team and the Blue Team. The Red Team’s role is to simulate barbarians at the gate: probing network defences and acting like attackers in order to expose and report weaknesses. Blue Team is left to pick up…

Copyright © 2017 Pathway Communications. All Rights Reserved. Pathway Legal