I was reading Shimel's blog today and followed an indication from him about another security blog, "JJ's Security Uncorked". It was a very nice surprise to find this post about three things that are often forgotten in network inventories, assessments and other processes:
Blind spots and JJ's blog
Blind spots and JJ's blog
Blind spots and JJ's blog
I was reading Shimel's blog today and followed an indication from him about another security blog, "JJ's Security Uncorked". It was a very nice surprise to find this post about three things that are often forgotten in network inventories, assessments and other processes: