Glossary

The types of penetration testing that retail stores need will directly be linked to the assets they have and what they are trying to protect.

Persona making a contactless payment with their phone

Retail Penetration Test

The types of penetration testing that retail stores need will directly be linked to the assets they have and what…

Man on a laptop with green text on screen

CEH Certification

CEH or Certified Ethical Hacker (EC-Council) has a recommended requirement of two years of IT experience with some basic familiarity…

Man typing

Malicious Code

Malicious code usually performs actions against the user’s interest.

computer worm

What is a computer worm and how do you prevent them?

Read our complete guide on what computer worms are, how they work & spread, why they’re dangerous & how to…

Background with digital numbers and graphics

What is Enumeration in Cyber Security?

Cyber security enumeration is a process used by both security professionals and attackers alike to establish a collective knowledge of…

Man in a server room

What is a Network Penetration Test?

Network penetration tests are used to identify security weaknesses within the networks (both internal networks and external networks). This includes…

Multiple screens with a lit up circle in the middle

What is Penetration Testing Software?

Penetration testing software is the toolset of penetration testers. These range from enumeration tools such as host and port discovery…

Laptop screen with code

Is Open Source or Proprietary More Secure?

Open-source software projects are, in theory, more secure than closed-source/proprietary software due to the clear disclosure of security vulnerabilities and…

a wall with AWS logo

Can You Pentest AWS?

Unless you are working directly with AWS then you will not be able to run a pentest against the AWS…