Hacker News new | past | comments | ask | show | jobs | submit login

There's a section on "running effective attack simulations" starting on slide 104. Where are you supposed to find the (simulated) attackers, within your own organization ? External contractors ?



My guess would be the same professional pentesters as usual but give them different marching orders rather than "See what you can break".




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: