REPORTS
Beware the SQL Injection

Download

Strategy: Choosing, Managing and Evaluating A Penetration Testing Service

Beware the SQL Injection

Choosing, Managing and Evaluating A Penetration Testing Service

Penetration, or pen, testing can be a frightening proposition, but what we don’t know can hurt us. Many companies are turning to outside pen testing providers to determine if — and where — security gaps exist. These penetration testing services can be extremely helpful in terms of strengthening a company’s security knowledge, and, thus, its posture, but there are a wide variety of offerings and not all of them are highly effective. 

In this Dark Reading report, we provide recommendations for what to look for, what to require and how to create an effective working relationship with an outsourced pen tester. We also offer some methods for evaluating the effectiveness of a penetration testing service and for ensuring that the service levels you are getting from your pen tester meet the needs of your organization. (S7380913)

 

Download
Table of Contents