Cyber Security Articles & News

What is Web Application Penetration Testing?

Is your company in the process of developing a new application? There are a lot of moving parts involved in developing and deploying cutting-edge applications, whether they are internal apps designed for employee use or external, public-facing apps. 

Read More >
External Network Penetration Testing: FAQs You Should Know

According to Forbes, “every company is now a reachable target” for threat actors. Advanced measures — such as penetration testing — have become a valuable component of cybersecurity for many organizations worldwide that seek to harden their security posture and stop threat actors in their tracks. 

Read More »
What's Included in a Penetration Test Report?

Penetration tests are an extremely useful exercise to mitigate risks and patch your security gaps. If you’ve been asking yourself why do penetration testing more than once, look no further than the pentest report for your answer. Below, we’ll discuss what’s included in a penetration testing report and why this information is crucial to shoring up your organization’s cybersecurity.

Read More »
Vulnerability Assessment vs Penetration Testing: Key Differences

While similar in some ways, the often interchangeably used vulnerability assessments and penetration tests are two different beasts. Throw vulnerability scans into the mix and, suddenly, most companies are confused.

Read More »
What is the Difference Between Blackbox, Greybox & Whitebox Pentesting?

When we speak of black, grey, and whiteboxes, we are not talking about the color of the PC on a desktop once called beige box. We are speaking of the amount of access a pentester has been given before attempting to breach a system or network. 

Read More »
Why Penetration Testing is More Important than Ever in 2020

Early 2020 has been an unprecedented year for businesses, not only across our great nation, but the world at large. Enterprises big and small have shut their doors— and for those that require a storefront or face-to-face interactions to deliver products and services, operations may have come to a grinding halt.

Read More »