Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| security [2022/05/19 16:09] – ↷ Links adapted because of a move operation 161.97.91.204 | security [2025/01/30 19:29] (current) – mgupton | ||
|---|---|---|---|
| Line 5: | Line 5: | ||
| * [[Security Assessment Tools]] | * [[Security Assessment Tools]] | ||
| * [[Vulnerability Assessment]] | * [[Vulnerability Assessment]] | ||
| + | * [[Governance, | ||
| + | * [[https:// | ||
| + | * [[Security Services and Solution Vendors]] | ||
| + | * [[Offensive Security]] | ||
| ===== Aphorisms ===== | ===== Aphorisms ===== | ||
| Line 10: | Line 14: | ||
| * //Best practices should not be considered hard and fast rules, but rather as helpful considerations.// | * //Best practices should not be considered hard and fast rules, but rather as helpful considerations.// | ||
| + | ====== Exploration and Discovery ====== | ||
| ======People and Blogs====== | ======People and Blogs====== | ||
| * [[http:// | * [[http:// | ||
| - | * [[https:// | ||
| * [[http:// | * [[http:// | ||
| + | * [[https:// | ||
| * [[wp> | * [[wp> | ||
| * [[https:// | * [[https:// | ||
| Line 23: | Line 28: | ||
| * [[https:// | * [[https:// | ||
| * [[https:// | * [[https:// | ||
| + | * [[https:// | ||