ChristinaLekati,

📚New Blog!
The 2nd part of my "Corporate for " article is now published.
This blog focuses on the physical perimeter of an organization.
It discusses some of the OSINT techniques used in the planning and preparation of in-person, social engineering attacks.

As security professionals, the goal is to proactively follow the same process a threat actor would to identify information that exposes potential vulnerabilities in our organization’s physical perimeter, and to manage those vulnerabilities.

My hope is that you'll proactively test those resources.

Need more help in getting the full picture on the information that is available about the physical perimeter of your organization? Feel free to reach out!

https://christina-lekati.medium.com/corporate-osint-for-social-engineering-physical-security-3d17f0a29849

  • All
  • Subscribed
  • Moderated
  • Favorites
  • OSINT
  • ngwrru68w68
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • megavids
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • provamag3
  • JUstTest
  • All magazines