Tag: Cyber Security

10 Types Of Security Assessments

๐Ÿ๐ŸŽ ๐“๐ฒ๐ฉ๐ž๐ฌ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ฌ๐ฌ๐ž๐ฌ๐ฌ๐ฆ๐ž๐ง๐ญ๐ฌ ๐„๐ฏ๐ž๐ซ๐ฒ ๐Ž๐ซ๐ ๐š๐ง๐ข๐ณ๐š๐ญ๐ข๐จ๐ง ๐’๐ก๐จ๐ฎ๐ฅ๐ ๐Š๐ง๐จ๐ฐ๐Ÿ‘‡ Most teams sayโ€œwe do security testing.โ€But what they really do is this:๐€ ๐ฌ๐œ๐š๐ง ๐ก๐ž๐ซ๐ž.๐€๐ง ๐š๐ฎ๐๐ข๐ญ ๐ญ๐ก๐ž๐ซ๐ž.๐Ž๐ง๐ž ๐ฉ๐ž๐ง๐ญ๐ž๐ฌ๐ญ. Maybe a red teamโ€ฆ…