Pen testing is all about doing all three of those things inside and outside of your business. We do all the obvious things and then go to the dark side to find vulnerabilities luring in the digital shadows. If we find a vulnerability, we attempt to exploit it (under controlled conditions) so we can close it.
For decades we have used heuristic methods for analysing data, looking for pre-programed patterns through Boolean based logic: AND, OR and IF. This logic has been critical in automating simple and repetitive tasks usually prone to human error. However, this programmatic approach cannot meet the defence requirements for the current cyber threat.
Reliance acsn’s Vice-Chairman, Tarquin Folliss, asks Dr Buchanan if a large part of our vulnerability to the disruptive consequences of cyber-attacks is a consequence of our failure to protect adequately what is critical to us?
Cyber risk must be articulated as a fundamental business risk and regularly reviewed at board level. Yet in many organisations cyber is still considered a risk the IT department will address, despite the existential threat for the entire business that a cyber-attack poses.
Contact us now on:
+44 (0)845 519 2946