Cyber Security Articles & News

What is External Network Pentesting?

If your organization has conducted a penetration test in the past, it was likely one of six main types of pentests

Read More >
6 FAQs From CISOs About the Pentesting Process

As a Chief Information Security Officer (CISO), you have the responsibility of not only directing your organization’s security but also conveying your risk status to leadership.

Read More »
How to Prioritize Your Pentesting Report’s Remediation Recommendations

So, you've decided to run a penetration test against your organization. But now... what do you do with the results? 

With so many vulnerabilities exposed, where should you even start? As a matter of fact, how do you even read this technical report?

Read More »
What is Web Application Penetration Testing?

Is your company in the process of developing a new application? Whether it’s an internal app intended for employee use or a public-facing external web app, there’s a lot of work that goes into creating and rolling out a cutting-edge application. 

In fact, your company may invest hundreds or thousands of hours designing and developing this new application—  so it’s no wonder that once it’s ready for launch, you want to immediately use it.

Read More »
What is a Red Team Pentesting?

If your company has invested in many penetration tests, you’re probably looking for more advanced ways of examining your security infrastructure. 

Read More »
Red Team Operations vs. Penetration Testing

It’s another new year, and another opportunity to tighten your ever-important security

With the threat landscape constantly evolving, you don’t need us to tell you that an annual penetration test is a must. 

Read More »
What is Penetration Testing?

A penetration test is a simulated cyber attack against your nonmalicious computer system to check for exploitable vulnerabilities. It’s a series of targeted nonmalicious attacks, intended to breach your cybersecurity defenses. The difference between a pentest and a real attack, however, is that penetration tests are conducted by ethical security professionals, who keep any extracted data private and ultimately help you improve your security posture. 

Read More »
Lessons from Penetration Testing: 7 Real-World Findings

The internet today is swarming with cybercriminals just waiting for the right opportunity to gain a foothold into your organization's network. One of the best ways to stay ahead is to find your organization's weak spots before cyber criminals do. 

Read More »
Penetration Testing vs. Vulnerability Assessments: The Key Differences

While similar in some ways, the often interchangeably used vulnerability assessments and penetration tests are two different beasts. Throw vulnerability scans into the mix and, suddenly, most companies are confused.

Read More »
Understanding the 6 Main Types of Penetration Testing

You’re considering conducting a formal penetration test to expose vulnerabilities within your system, but where to start? Upon some quick research, you discover that there’s actually more than one type of penetration test— and suddenly you’re lost in a jungle of jargon, asking yourself some confusion questions: 

Read More »