<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Main Blog</title>
    <link>https://www.mitnicksecurity.com/blog</link>
    <description />
    <language>en-us</language>
    <pubDate>Wed, 19 Jul 2023 13:34:40 GMT</pubDate>
    <dc:date>2023-07-19T13:34:40Z</dc:date>
    <dc:language>en-us</dc:language>
    <item>
      <title>User Deception: The Biggest Cyber Threat CISOs are Forgetting</title>
      <link>https://www.mitnicksecurity.com/blog/user-deception</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/user-deception" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/user-deception-the-biggest-cyber-threat-cisos-are-forgetting-working.jpeg" alt="User Deception: The Biggest Cyber Threat CISOs are Forgetting" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As a CISO, you're always looking for the next big breakthrough to increase your organization's overall security posture.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/user-deception" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/user-deception-the-biggest-cyber-threat-cisos-are-forgetting-working.jpeg" alt="User Deception: The Biggest Cyber Threat CISOs are Forgetting" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As a CISO, you're always looking for the next big breakthrough to increase your organization's overall security posture.&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fblog%2Fuser-deception&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>employee security training</category>
      <category>employee risks</category>
      <pubDate>Wed, 19 Jul 2023 13:34:40 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/blog/user-deception</guid>
      <dc:date>2023-07-19T13:34:40Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>The Penetration Testing Process</title>
      <link>https://www.mitnicksecurity.com/blog/penetration-testing-process</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/penetration-testing-process" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/CISO%20FAQs%20About%20Pentesting.jpg" alt="The Penetration Testing Process" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As a Chief Information Security Officer (CISO), you have the responsibility of not only directing your organization’s security but also conveying your risk status to leadership. The stakes are high. According to Cybersecurity Magazine, &lt;a href="https://cybersecurityventures.com/60-percent-of-small-companies-close-within-6-months-of-being-hacked/"&gt;60%&lt;/a&gt; of small businesses go out of business within six months of falling victim to a data breach or cyber attack.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/penetration-testing-process" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/CISO%20FAQs%20About%20Pentesting.jpg" alt="The Penetration Testing Process" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As a Chief Information Security Officer (CISO), you have the responsibility of not only directing your organization’s security but also conveying your risk status to leadership. The stakes are high. According to Cybersecurity Magazine, &lt;a href="https://cybersecurityventures.com/60-percent-of-small-companies-close-within-6-months-of-being-hacked/"&gt;60%&lt;/a&gt; of small businesses go out of business within six months of falling victim to a data breach or cyber attack.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fblog%2Fpenetration-testing-process&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>penetration testing</category>
      <category>penetration test</category>
      <category>security penetration testing</category>
      <pubDate>Tue, 27 Jun 2023 13:25:28 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/blog/penetration-testing-process</guid>
      <dc:date>2023-06-27T13:25:28Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>Red Team Penetration Testing With Mitnick: What to Expect</title>
      <link>https://www.mitnicksecurity.com/blog/red-team-penetration-testing-what-to-expect</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/red-team-penetration-testing-what-to-expect" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/included-in-pentesting-report.jpeg" alt="pentesting" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A data breach can have &lt;a href="https://hbr.org/2023/05/the-devastating-business-impacts-of-a-cyber-breach"&gt;&lt;span&gt;extremely negative impacts on businesses&lt;/span&gt;&lt;/a&gt;, including financial losses as well as harm to their reputation with clients, customers, and workers.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/red-team-penetration-testing-what-to-expect" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/included-in-pentesting-report.jpeg" alt="pentesting" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A data breach can have &lt;a href="https://hbr.org/2023/05/the-devastating-business-impacts-of-a-cyber-breach"&gt;&lt;span&gt;extremely negative impacts on businesses&lt;/span&gt;&lt;/a&gt;, including financial losses as well as harm to their reputation with clients, customers, and workers.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fblog%2Fred-team-penetration-testing-what-to-expect&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>penetration testing</category>
      <category>Red Team</category>
      <pubDate>Fri, 23 Jun 2023 14:10:23 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/blog/red-team-penetration-testing-what-to-expect</guid>
      <dc:date>2023-06-23T14:10:23Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>Cyber Security Penetration Testing for Multinational Corporations</title>
      <link>https://www.mitnicksecurity.com/blog/cyber-security-penetration-testing</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/cyber-security-penetration-testing" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Penetration%20Testing%20Service%20Considerations%20for%20Multinational%20Enterprise%20Corporations.jpeg" alt="Cyber Security Penetration Testing for Multinational Corporations" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/cyber-security-penetration-testing" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/Penetration%20Testing%20Service%20Considerations%20for%20Multinational%20Enterprise%20Corporations.jpeg" alt="Cyber Security Penetration Testing for Multinational Corporations" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fblog%2Fcyber-security-penetration-testing&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security penetration testing</category>
      <pubDate>Wed, 07 Jun 2023 13:16:11 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/blog/cyber-security-penetration-testing</guid>
      <dc:date>2023-06-07T13:16:11Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>External Network Penetration Testing: FAQs You Should Know</title>
      <link>https://www.mitnicksecurity.com/blog/external-network-penetration-testing</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/external-network-penetration-testing" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/What%20is%20External%20Network%20Pentesting.jpg" alt="External network penetration testing tests your external systems like email, project management tools, etc. to ensure expose vulnerabilities." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;According to &lt;a href="https://www.forbes.com/sites/chuckbrooks/2023/03/05/cybersecurity-trends--statistics-for-2023-more-treachery-and-risk-ahead-as-attack-surface-and-hacker-capabilities-grow/?sh=3e3bb79a19db"&gt;Forbes&lt;/a&gt;, “every company is now a reachable target” for threat actors. Advanced measures — such as penetration testing — have become a valuable component of cybersecurity for many organizations worldwide that seek to harden their security posture and stop threat actors in their tracks.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/external-network-penetration-testing" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/What%20is%20External%20Network%20Pentesting.jpg" alt="External network penetration testing tests your external systems like email, project management tools, etc. to ensure expose vulnerabilities." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;According to &lt;a href="https://www.forbes.com/sites/chuckbrooks/2023/03/05/cybersecurity-trends--statistics-for-2023-more-treachery-and-risk-ahead-as-attack-surface-and-hacker-capabilities-grow/?sh=3e3bb79a19db"&gt;Forbes&lt;/a&gt;, “every company is now a reachable target” for threat actors. Advanced measures — such as penetration testing — have become a valuable component of cybersecurity for many organizations worldwide that seek to harden their security posture and stop threat actors in their tracks.&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fblog%2Fexternal-network-penetration-testing&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>penetration testing</category>
      <category>penetration tests</category>
      <category>security penetration testing</category>
      <pubDate>Tue, 06 Jun 2023 14:43:06 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/blog/external-network-penetration-testing</guid>
      <dc:date>2023-06-06T14:43:06Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>Everything You Need To Know About Mitnick's Password Cracker</title>
      <link>https://www.mitnicksecurity.com/blog/password-cracker-mitnick-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/password-cracker-mitnick-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/password%20cracker.jpg" alt="person on laptop" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Password cracking is a popular method used by hackers worldwide to ultimately gain access to sensitive data, making it vital for organizations to ensure their passwords are strong enough to withstand the most advanced password-cracking hacks.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/password-cracker-mitnick-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/password%20cracker.jpg" alt="person on laptop" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Password cracking is a popular method used by hackers worldwide to ultimately gain access to sensitive data, making it vital for organizations to ensure their passwords are strong enough to withstand the most advanced password-cracking hacks.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fblog%2Fpassword-cracker-mitnick-security&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>penetration testing</category>
      <category>Password Management</category>
      <pubDate>Thu, 01 Jun 2023 13:06:53 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/blog/password-cracker-mitnick-security</guid>
      <dc:date>2023-06-01T13:06:53Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>What is a Penetration Testing Framework?</title>
      <link>https://www.mitnicksecurity.com/blog/what-is-a-penetration-testing-framework</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/what-is-a-penetration-testing-framework" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/AdobeStock_178167691.jpeg" alt="Hands on keyboard" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Penetration testing services are performed by cybersecurity companies to help find weaknesses in an organization's network, internal systems, and show that organization how threat actors can exploit those vulnerabilities.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/what-is-a-penetration-testing-framework" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/AdobeStock_178167691.jpeg" alt="Hands on keyboard" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Penetration testing services are performed by cybersecurity companies to help find weaknesses in an organization's network, internal systems, and show that organization how threat actors can exploit those vulnerabilities.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fblog%2Fwhat-is-a-penetration-testing-framework&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>pentest team</category>
      <category>security penetration testing</category>
      <pubDate>Tue, 16 May 2023 12:53:29 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/blog/what-is-a-penetration-testing-framework</guid>
      <dc:date>2023-05-16T12:53:29Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>What To Expect During Red Team Operations</title>
      <link>https://www.mitnicksecurity.com/blog/red-team-operations</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/red-team-operations" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/what%20to%20expect%20during%20red%20team%20operations.jpeg" alt="red team operations" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Companies are producing an exponential amount of data every day and by 2025, it’s estimated that there will be about &lt;a href="https://www.statista.com/statistics/871513/worldwide-data-created/"&gt;&lt;span&gt;181 zettabytes of data&lt;/span&gt;&lt;/a&gt;. As your organization grows, so will the amount of data it requires to operate, opening up more opportunities for hackers to exploit your organization.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/red-team-operations" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/what%20to%20expect%20during%20red%20team%20operations.jpeg" alt="red team operations" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Companies are producing an exponential amount of data every day and by 2025, it’s estimated that there will be about &lt;a href="https://www.statista.com/statistics/871513/worldwide-data-created/"&gt;&lt;span&gt;181 zettabytes of data&lt;/span&gt;&lt;/a&gt;. As your organization grows, so will the amount of data it requires to operate, opening up more opportunities for hackers to exploit your organization.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fblog%2Fred-team-operations&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>penetration testing</category>
      <category>Red Team</category>
      <pubDate>Fri, 28 Apr 2023 13:05:48 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/blog/red-team-operations</guid>
      <dc:date>2023-04-28T13:05:48Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>Considerations When Choosing Between Pentesting Companies</title>
      <link>https://www.mitnicksecurity.com/blog/pentesting-companies</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/pentesting-companies" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/types%20of%20pentesting%20companies.jpeg" alt="choosing the right type of pentesting company" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As business models continue to evolve the need for cybersecurity measures is more necessary than ever before.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/pentesting-companies" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/types%20of%20pentesting%20companies.jpeg" alt="choosing the right type of pentesting company" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As business models continue to evolve the need for cybersecurity measures is more necessary than ever before.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fblog%2Fpentesting-companies&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>penetration test</category>
      <pubDate>Thu, 13 Apr 2023 14:47:19 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/blog/pentesting-companies</guid>
      <dc:date>2023-04-13T14:47:19Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
    <item>
      <title>Red Team vs. Blue Team Penetration Testing: 3 Differences</title>
      <link>https://www.mitnicksecurity.com/blog/red-team-vs.-blue-team</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/red-team-vs.-blue-team" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/AdobeStock_313021906.jpeg" alt="Red Team vs. Blue Team Penetration Testing: 3 Differences" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;If you want to see how your organization would stack up against threat actors, there is a way to do so without risking a data breach. Red Team vs. Blue Team penetration testing is a safe way to identify vulnerabilities within your systems, networks, and internal infrastructure. But it doesn’t stop there. This elite form of a pentest can show you what a threat actor accomplishes even if your cybersecurity posture is well established. Below, we’ll tackle the three differences between the Red Team and the Blue Team for this engagement.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.mitnicksecurity.com/blog/red-team-vs.-blue-team" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.mitnicksecurity.com/hubfs/AdobeStock_313021906.jpeg" alt="Red Team vs. Blue Team Penetration Testing: 3 Differences" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;If you want to see how your organization would stack up against threat actors, there is a way to do so without risking a data breach. Red Team vs. Blue Team penetration testing is a safe way to identify vulnerabilities within your systems, networks, and internal infrastructure. But it doesn’t stop there. This elite form of a pentest can show you what a threat actor accomplishes even if your cybersecurity posture is well established. Below, we’ll tackle the three differences between the Red Team and the Blue Team for this engagement.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3875471&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.mitnicksecurity.com%2Fblog%2Fred-team-vs.-blue-team&amp;amp;bu=https%253A%252F%252Fwww.mitnicksecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>penetration testing</category>
      <category>Red Team</category>
      <pubDate>Tue, 04 Apr 2023 11:46:17 GMT</pubDate>
      <guid>https://www.mitnicksecurity.com/blog/red-team-vs.-blue-team</guid>
      <dc:date>2023-04-04T11:46:17Z</dc:date>
      <dc:creator>Mitnick Security</dc:creator>
    </item>
  </channel>
</rss>
