Posted on 04/15/201307/11/2016 Defining The Difference Between A Penetration Test, Vulnerability Assessment and Security Audit
Posted on 02/20/201312/05/2013 PART 2 “The Attack” – THE SOCIAL MEDIA DECEPTION PROJECT : How We Created Emily Williams To Compromise Our Target
Posted on 02/11/201312/05/2013 THE SOCIAL MEDIA DECEPTION PROJECT : How We Created Emily Williams To Compromise Our Target
Posted on 02/05/201303/01/2016 My Awesome Portable Lab – Apple Mac mini Running ESXI 5.0 5.1 hosting Cisco ISE, NCS, Backtrack, Lancope and More