An IT administrator recently vented his frustration about having to conduct a penetration test.
He wanted an in-depth assessment of his system to make sure his network was operating with a low risk profile, all while still making all the required services available to his users.
His firm has cloud services, several sensitive databases, internal and external networks, not to mention multiple operating systems (the designers “demanded” Apple products).
The idea was ...
Read More →
14
AUG
2017
AUG
2017
0