Why security pros must get creative with penetration testing (and how to do it)

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more.

Security pros must evolve to catch the bad guys using spear phishing, phone calls, on-site visits, and more to get at corporate data

Security professionals have long been running penetration tests against their firewalls and other security systems to find weaknesses that need to be addressed.

The Common Vulnerability Scoring System is an industry standard, but has been around for a while.

[ It's time to take another look at security. Two former CIOs show you how to rethink your security strategy for today's world. Bonus: Available in PDF and e-book versions. | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]

The bad guys, however, aren't limiting themselves to the traditional perimeter attacks anymore. They're using spear phishing, phone calls and on-site visits and other techniques to get at corporate data.

"As cyber criminals evolve, we must, as well," said Demetrios Lazarikos, security strategist and former chief information security officer for Sears Online.

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
From CIO: 8 Free Online Courses to Grow Your Tech Skills
Join the discussion
Be the first to comment on this article. Our Commenting Policies