• Define vulnerability assessment and explain why it is important
• Explain the differences between vulnerability scanning and penetration testing
• Describe the security implications of integration with third parties
• List techniques for mitigating and deterring attacks
A wild-goose chase is a figurative term for a lengthy and useless pursuit that ends in frustration. Used as far back as William Shakespeare in his play Romeo and Juliet, the phrase rarely comes to mind when thinking about defending against attacks directed at information technology (IT) resources. But one company is now specializing in leading ...