Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
security [2022/05/19 16:09] – ↷ Links adapted because of a move operation 161.97.91.204 | security [2025/01/30 19:29] (current) – mgupton | ||
---|---|---|---|
Line 5: | Line 5: | ||
* [[Security Assessment Tools]] | * [[Security Assessment Tools]] | ||
* [[Vulnerability Assessment]] | * [[Vulnerability Assessment]] | ||
+ | * [[Governance, | ||
+ | * [[https:// | ||
+ | * [[Security Services and Solution Vendors]] | ||
+ | * [[Offensive Security]] | ||
===== Aphorisms ===== | ===== Aphorisms ===== | ||
Line 10: | Line 14: | ||
* //Best practices should not be considered hard and fast rules, but rather as helpful considerations.// | * //Best practices should not be considered hard and fast rules, but rather as helpful considerations.// | ||
+ | ====== Exploration and Discovery ====== | ||
======People and Blogs====== | ======People and Blogs====== | ||
* [[http:// | * [[http:// | ||
- | * [[https:// | ||
* [[http:// | * [[http:// | ||
+ | * [[https:// | ||
* [[wp> | * [[wp> | ||
* [[https:// | * [[https:// | ||
Line 23: | Line 28: | ||
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
+ | * [[https:// | ||