Why security pros must get creative with penetration testing (and how to do it)

Security pros must evolve to catch the bad guys using spear phishing, phone calls, on-site visits, and more to get at corporate data

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

Security professionals have long been running penetration tests against their firewalls and other security systems to find weaknesses that need to be addressed.

The Common Vulnerability Scoring System is an industry standard, but has been around for a while.

[ It's time to take another look at security. Two former CIOs show you how to rethink your security strategy for today's world. Bonus: Available in PDF and e-book versions. | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]

The bad guys, however, aren't limiting themselves to the traditional perimeter attacks anymore. They're using spear phishing, phone calls and on-site visits and other techniques to get at corporate data.

To continue reading this article register now

Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.