Blog

The Difference Between Pen Tests and Vulnerability Assessments

The Difference Between Pen Tests and Vulnerability Assessments

What is a Vulnerability Assessment? During a vulnerability assessment, the assessment team seeks to identify vulnerabilities, assess their qualities and the risks associated with them, and prioritize the threats posed to the system. The team will seek thorough...

Why upgrade to EBS R12?

Why upgrade to EBS R12?

Did you know that Oracle R12 Extended Support AND Oracle Database 11.2g Premier Support ended in January 2015? Further, did you know that Oracle’s remaining sustaining support is neither cost-effective nor optimal? By upgrading to EBS R12, you can reduce cost and risk...

Disaster Recovery Planning

Disaster Recovery Planning

Disasters can take innumerable forms, from man-made accidents or terrorists to natural disasters. No matter what the disaster is, the consequences remain: 80% of businesses affected by a major incident either never re-open, or close within 18 months. What is a DRP? In...

Penetration Testing Explained: What, How, and Why

Penetration Testing Explained: What, How, and Why

What is Penetration Testing? Also known in the field as a “pen test,” companies use penetration tests to identify and overcome network security weakness before third parties are able to exploit them. Penetration tests take a number of forms: Targeted (or “lights on”)...