Blind Leading the Blind: The Rise of Test-Centric Security

When I was interviewed this morning by a journalist on what technologies financial institutions can use to shift the timeline left to detect breaches more quickly, it got me thinking. If we bring our car in to the shop regularly for tuneups and to ensure our security controls, such as the brakes are working as expected for example, then why don’t we test our security controls in our…

--

--

--

Hacker | Cybersecurity Content Creator | Influencer | Published Author

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

NKN Gets Listed on KuCoin!

The California Consumer Privacy Act: Impacts and Considerations

The Evil Twin that’s hampering your security online: Evil Twin Attacks

TryHackMe | Web Scanning Walkthrough

Create Security Lists in OCI using OCI CLI

15 Best Security Tools You Should Have on Linux

Cyberattacks — What do ‘we’ know about them?

It’s Not Going to Happen to Me

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Alissa Knight

Alissa Knight

Hacker | Cybersecurity Content Creator | Influencer | Published Author

More from Medium

Notes: Sources of SecInfo used by Greenbone (GVM)

Triggering Time Delays to Identify Blind SQL Injection Vulnerability

What is Penetration Testing or Ethical Hacking?

White Hat vs Black Hat vs. Gray Hat

Knife Write up