Or what makes the ethical hacker
If ethical hackers can do everything cybercriminals do, what is keeping them from wrongdoing? Let's see how they differ and how that shows in codes of ethics.
Recognize the value of this security assessment method
We took as a basis a question from Tribe of Hackers Red Team (2019) aimed at explaining the value of red teaming to those who're reluctant or unaware of it.
The basics of cloud security posture management
Cloud security posture management involves vulnerability assessment, prioritization and remediation to secure cloud-based systems and infrastructures.
Tips for choosing a vulnerability management solution
If you are still wondering what you should pay more attention to when choosing a vulnerability management solution, we recommend you read this blog post.
Definition, implementation, importance and alternatives
Learn about vulnerability remediation, its place and importance in vulnerability management, and differentiate it from vulnerability mitigation and acceptance.
Vulnerability scanning and pentesting for a safer web
Learn how website and web app security scanning work, their role in vulnerability management, and why mix them with pentesting in vulnerability assessment.
Definitions, classifications and pros and cons
Learn what vulnerability scanners and vulnerability scanning are, what their classifications are, and what their pros and cons are.
Is your security testing covering the right risks?
You need to prioritize the security testing techniques that cover the actual threats you're facing. We explain how Lumu's MITRE ATT&CK® Global Matrix can help.
How this process works and what benefits come with it
Learn about the vulnerability management process, its stages, and the benefits your organization can obtain by implementing it.