Penetration Testing
Resources Blog

Penetration Testing

Keep up to date with the latest offensive security news, knowledge, and resources.
Continuous Pen Testing vs. Bug Bounties: A Comprehensive Comparison
Jan 15, 2021

Continuous Pen Testing vs. Bug Bounties: A Comprehensive Comparison

In-depth info. to consider before choosing how you’ll test network security. If you’ve thought about using a bug-bounty program to test your organization’s network, hit pause and read this first.
Why Users Are a Top Threat – And Bug Bounties Fall Short
Dec 18, 2020

Why Users Are a Top Threat – And Bug Bounties Fall Short

Bug-bounty programs live and die by their ability to target public-facing assets and then expose related vulnerabilities. But one asset is out of their reach, and it’s arguably the most dangerous to your network.
Bug Bounty vs. Continuous Pen Testing: Understanding the Basics
Dec 10, 2020

Bug Bounty vs. Continuous Pen Testing: Understanding the Basics

Oh, the world of good ol’ bug-bounty programs. In recent months they’ve become a hot topic for IT teams looking to unearth vulnerabilities. And it’s easy to see why. They’re flashy and promise the world. Your company gets notified when a vulnerability is detected. The bounty hunter gets paid for the finding. Everybody leaves happy. Well, not really. Here’s why
InBusiness column: How testing protects your data – and bottom line
Dec 01, 2020

InBusiness column: How testing protects your data – and bottom line

Getting hacked hurts. Not only is it often a PR nightmare and the cause of sleepless nights – a company data breach is a financial fright fest that can cost you millions of dollars.
Top 5 ways hackers break into your network
Dec 01, 2020

Top 5 ways hackers break into your network

Practical, expert-tested guidance you can apply to immediately improve your network security.
7 8 9 10 11