6 Results / Page 1 of 1

writing an effective penetration testing report

todayNovember 14, 2021

  • 516
  • 201

Penetration testing SECLINQ Security Specialist

Penetration Testing Report: Tips for Effective Writing

Penetration testing is the process of attacking a system to determine security vulnerabilities. This is often done as a preliminary step before the system is deployed or as a check to see how well a system has been hardened. A penetration testing report is a document that summarizes the vulnerabilities [...]
NIST penetration testing

todayNovember 5, 2021

  • 464
  • 199

Penetration testing SECLINQ Security Specialist

NIST Penetration Testing

NIST is a well-known foundation in the IT sector that created many standards and one of them is NIST penetration testing guidelines. The US National Institute of Standards and Technology has created countless standards that everyone can relate to. The definition of cloud is a well-known example of this. The [...]
Red Teaming Nederland

todayOctober 21, 2021

  • 341
  • 196

Penetration testing SECLINQ Security Specialist

Red Teaming Nederland

Pentesting vs. Red Teaming in Nederland: Wat zijn de voordelen? Het Hoe, Wat en Waarom. Bescherm je organisatie op de beste manier tegen cybercriminelen en val niet ten prooi aan de aanvallen van buiten- én binnenaf.   Wat is een Pentest? Een penetratietest is een beveiligingstest om de beveiliging van [...]
top ten teps for wireless pentesting

todayOctober 16, 2021

  • 588
  • 197

Penetration testing SECLINQ Security Specialist

Top Ten Tips for Wireless Pentesting

Top Ten Tips for Wireless Pentesting   A hacker's perspective The use of wireless networks has really taken off. With a mobile device (smartphone, tablet, laptop) anyone anywhere in the world can access their own digital environment via WiFi. That brings into the picture additional network threats such as: unauthorized [...]
secure software

todayOctober 11, 2021

  • 289
  • 193

Cyber security SECLINQ Security Specialist

Secure software development

Developing Secure Software   A Look at the Process The main reason for developing secure software is the risk of damage. Think of financial damage as a result of a hack. As a result, your website or application is inaccessible and you as an organization miss out on direct revenue. [...]
REvil Kaseya Attack

todayJuly 24, 2021

  • 246
  • 194

Ransomware SECLINQ Security Specialist

REvil Kaseya Attack – A guide to avoid being a victim

REvil Kaseya Attack All the details This blog post will cover the reasons why IT admins should be wary of the REvil Kaseya attack. Kaseya is a company that provides IT management software for small to large businesses. The company started in 2000 and is based in San Mateo, California. ...