Authenticated scan vs unauthenticated

Authenticated scan vs unauthenticated

In vulnerability scanning, there’s a big difference in an authenticated scan vs unauthenticated. Here’s why it matters, and why you should almost always go for an authenticated scan. Using authenticated scans is a vulnerability management best practice.

Lots of people misunderstand this. To quote myself about fifteen years ago: “Let me get this straight. I give you an admin account, and then you tell me you were able to log in?” It’s about logging in and assessing what’s wrong, not telling you we got in. Regardless of the tool you use, authenticated scans let the vulnerability scanner do its job better.

Read more

Vulnerability management best practices

Vulnerability management best practices

As a vulnerability management professional, I talk about vulnerability management best practices a lot. It comes up in sales presentations. I talk about it when my phone rings and a former colleague just needs to talk. But based on my experience, not many companies do vulnerability management well. If you’re not happy with your vulnerability management program, here are some best practices to help you get the results you want.

Read more

How long to study for CISSP

How long to study for CISSP

People frequently ask me how long to study for CISSP. Unfortunately it’s hard to give a set answer for that, but I can tell you how to figure out how long you need to study for it. That’s almost as good.

Don’t believe anyone who tells you they can get you ready in x number of days or weeks or even months. No one can know where you are relative to what you need to know to pass that test.

Read more

What does a CISSP do?

What does a CISSP do?

A CISSP is a professional certification. To attain CISSP, a professional must pass a six-hour, 250-question test and must have five years of professional experience doing work related to computer security. But after attaining the certification, what does a CISSP do?

An easy question on the test would involve what you have to be concerned about when running network cable through an HVAC duct. A medium-difficulty question might ask whether the CDMA or GSM standard for cell phones is more secure, and why. A hard question or series of questions would involve reading several pages of executive summary about a data breach and making recommendations to prevent it from happening again.

Read more

Difference between antivirus and antimalware

Difference between antivirus and antimalware

The difference between antivirus and antimalware is largely academic, but understanding it can help you understand what protection you’re getting when you buy off-the-shelf security software.

I have to explain it myself pretty frequently, because people will see the words “antimalware” in my employer’s product brochures and they immediately say, “Tell me about your antivirus.”

Read more

WordPress Appliance - Powered by TurnKey Linux