According to the EC-Council definition, “Penetration Testing is a legal, structured procedure to evaluate the security posture of an organization. This practice simulates an attack against the security infrastructure of the enterprise, such as its network, applications, and users, to identify the exploitable vulnerabilities. It determines the efficacy of the company’s security policies, controls and […]
What is Ethical Hacking?
Movies have popularized the character of the “hacker”, so everybody is already familiar with the term. According to Wikipedia, a hacker is “a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means”. It is quite a good definition, but rather incomplete; first, […]
How to keep SAP REALLY up to date with Security notes
Keeping SAP up to date is always a necessity given that we want to keep our systems up to date and protected, yet we must admit that it isn’t easy to do. There is an excess of information in a rapidly-changing complex world in which technologies, rules, laws, crackers, hackers, tools and vulnerabilities quickly appear […]