
Sign up to save your podcasts
Or
Companies must communicate clear expectations when contracting with pentesters, red teams and vulnerability hunters in order to set key ground rules for what data and systems can be accessed, what’s off limits and who is responsible if something breaks. Of course, if you set too many restrictions and parameters, then how do you really know if you’re safe from malicious hackers, who of course don’t play by the rules? Plus: We Speak Geek, a weekly segment where our guest shares what they geek out about!
Show Notes: https://scmagazine.com/cfh1
Companies must communicate clear expectations when contracting with pentesters, red teams and vulnerability hunters in order to set key ground rules for what data and systems can be accessed, what’s off limits and who is responsible if something breaks. Of course, if you set too many restrictions and parameters, then how do you really know if you’re safe from malicious hackers, who of course don’t play by the rules? Plus: We Speak Geek, a weekly segment where our guest shares what they geek out about!
Show Notes: https://scmagazine.com/cfh1