Company XYZ, a mid-sized corporation, is in the middle of satisfying their regulatory compliance needs. The manager of security at the company has been tasked by the CIO (Chief Information Officer) to report on the companys current security posture. You are called upon as a 3rd party penetration tester, based […]