Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
philsnow
on Aug 30, 2013
|
parent
|
context
|
favorite
| on:
Attack-driven defense
There's a section on "running effective attack simulations" starting on slide 104. Where are you supposed to find the (simulated) attackers, within your own organization ? External contractors ?
rurounijones
on Aug 30, 2013
[–]
My guess would be the same professional pentesters as usual but give them different marching orders rather than "See what you can break".
Consider applying for YC's W25 batch! Applications are open till Nov 12.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: