Traditional pentesting v. continuous pentesting

We get a lot of questions about what makes continuous penetration testing more valuable than traditional timebox testing. Seriously, A LOT of questions – all of which are warranted.

Take a look below, and we’re pretty sure you’ll see the benefits when the two methods are stacked side-by-side.

Read More...

CPT in the wild: 3 real-world examples that prove its value

We get it, regular ol’ once-a-year penetration testing is the norm. It’s what your company has budgeted for, what you’re IT team is used to, and in many cases, what your expected to do. But that doesn’t mean it’s the best way to protect your network.

Think about this: Why would you test your network security from emerging cyber-security threats only once a year. That’s like picking a random day and turning on your home’s security system. Yea, you’re safe for a moment – but only for a point in time.

Read More...

Fourteen good reasons to require 14-character passwords

Password. Password123. Yea, you’ve seen them all when it comes to bad passwords. It comes standard when managing IT security.

But while your organization likely requires special characters, uppercase letters and even a number or two, if you don’t require longer passwords you’re not taking one of the most important steps to protect your network.

We’ve laid out 14 credible reasons to require everyone in your organization to use 14-character passwords. We’re pretty sure you’ll be convinced. If not, long live Password123.

Read More...

VIDEO: How Continuous Penetration Testing Works (the best)

Trying to wrap your head around what separates Continuous Penetration Testing from other forms of network security testing? Well, we get it.

That’s why we’ve put together this handy little video. Sit back, have a snack and learn how CPT works, why it’s advantageous and how it can help you keep your organization’s network safe.

Read More...

Cybersecurity Slang – Key Terms for talking the talk

If you’re not in the cybersecurity trenches daily, it can be tough to get a clear understanding of many popular terms used by the professionals testing your organization’s network.

To lend you a hand, we’ve compiled a list of some terms you can expect to see regularly (especially if you work with us). We’ll keep this list updated regularly. And, if you don’t see a term you’ve heard just send us a note. We’ll be sure to add it.

Read More...

What vulnerability scanners don’t catch – and how it can cost your business millions

Automated Vulnerability Scanners, on the surface, have a lot of appeal to IT directors. But the harsh reality is they provide a false sense of security and leave your network exposed. Click to learn more about understanding scanners and pentesting.

Read More...

InBusiness column: How testing protects your data – and bottom line

Getting hacked hurts. Not only is it often a PR nightmare and the cause of sleepless nights – a company data breach is a financial fright fest that can cost you millions of dollars. That’s no secret. But often for business owners and executives it isn’t clear why cybersecurity pros use continuous penetration testing to protect their network, brand – and the bank.

In a recent column in InBusiness, Sprocket Security’s founder Casey Cammilleri breaks down the basics of penetration testing and why it’s an essential piece of your network security plan.

Read More...

3 New Phishing Streams Beyond Email - And How To Safeguard Them

There are cybersecurity phishing streams & threats constantly growing and evolving. Email spam is no longer the front line of the battlefield. Here are 3 new phishing streams beyond email - and how to safeguard them.

Read More...