My department recently had our TS department conduct a pen test of our external firewall. During the engagement they went out of scope and exploited a device out of bounds. Then misrepresented the results to my department. How should this be handled.
Thanks in advance.
|thread locked Quote Subscribe||
May 28th 2017
5 years ago