-
Archives
- August 2024
- January 2024
- December 2023
- September 2023
- July 2023
- March 2023
- August 2022
- January 2022
- October 2021
- October 2020
- May 2020
- March 2020
- November 2018
- September 2017
- October 2016
- December 2015
- September 2015
- January 2015
- November 2014
- July 2014
- April 2014
- March 2014
- December 2013
- November 2013
- October 2013
- September 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- November 2012
- October 2012
- July 2012
- June 2012
- April 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
-
Meta
Monthly Archives: March 2010
Source Conference: Boston Agenda & Barcelona CFP
Si estas en US no te pierdas la conferencia SOURCE con su incre铆ble agenda: http://www.sourceconference.com/index.php/boston2010/sb2010-schedule Y si estas por Europa pues te interesa venir a SOURCE Barcelona: http://www.sourceconference.com/index.php?option=com_rsform&formId=18&Itemid=99999 Nos vemos!!! 馃檪 If you are in US don’t miss the SOURCE … Continue reading
Attack Surface Analysis Infinitum
En cualquier revisi贸n de seguridad ya sea un test de intrusi贸n, revisi贸n de una aplicaci贸n web o de c贸digo fuente el Attack Surface Analysis (ASA) es una poderosa metodolog铆a que podemos utilizar para identificar los vectores de ataque del sistema. … Continue reading
Posted in Microsoft, OWASP, Pentest, SDL, Security, Threat Modeling
Tagged attack vector, Critical Infratructures, Information Security, Penetration Testing
Leave a comment