Ndubuisi Ekekwe
AUTHOR: Ndubuisi Ekekwe
Great Products + Execution = Sustained Growth
I have studied great companies and this is my summary: the only common thing in all of them is GREAT Product and the obvious...
17.4 – Tools & Techniques
Hackers want to compromise computers and networks to steal confidential data from enterprises through sophisticated malware. According to Gartner, a technology research firm, an...
17.3 – Vulnerability Prevention
In this section, we’ll look at the top five common vulnerability prevention techniques, and provide tips on how an enterprise can fix such issues,...
17.2 – Security Testing Frameworks
There are several security testing frameworks being used by security inspectors for technical control assessment. The most common security testing frameworks are:
...
17.1 – Vulnerability Assessment & Risk Analysis
Vulnerability assessment is an important sub task of risk analysis. Vulnerability assessment is designed as a tool which detects real risks on resources, using...