Podcast: Penetration testing with Ed Skoudis
Cyber security consultant and trainer, Ed Skoudis, explains how thinking like a hacker can be the key to finding vulnerabilities in your control networks.
If you are trying to evaluate your cyber defenses, one sure test is to see if you can find a weak point and make it break. Such is the objective with penetration testing, where system evaluators use the same techniques as a hacker to probe for vulnerabilities and exploit them. When the hacker is working for you, there's time to fix things before someone more malicious finds the same weakness.
Ed Skoudis is a co-founder of Inguardians and an instructor in penetration testing for the SANS Institute . In the podcast, he explains how penetration testing differs from more general vulnerability assessments, and how hackers can exploit low-level vulnerabilities by using them in combination. When a team of specialists starts to pull apart a system, each using his or her specific area skills, flaws can be identified before it's too late.
Listen to the podcast now , and look for other cyber security podcasts and videos at CEtv . Also read our cyber security blog with Matt Luallen and Steve Hamburg .
|Search the online Automation Integrator Guide|
Case Study Database
Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.
These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.
Click here to visit the Case Study Database and upload your case study.