Policy and Best Practices
Resources Blog

Policy and Best Practices

Keep up to date with the latest offensive security news, knowledge, and resources.
Attack Surface vs Attack Vector: Understanding the Difference
Dec 19, 2024

Attack Surface vs Attack Vector: Understanding the Difference

Penetration testing, or pentesting, simulates an attack on a system to evaluate its defenses. Vulnerability testing identifies and evaluates system security weaknesses.
Ahead of the Breach - Lorenzo Pedroncelli, Senior Manager at RSA Security
Dec 18, 2024

Ahead of the Breach - Lorenzo Pedroncelli, Senior Manager at RSA Security

Ahead of the Breach Podcast sits down with Lorenzo Pedroncelli, Senior Manager at RSA Security, to discuss his thoughts on identity security as a cornerstone of cybersecurity.
Pentest Reports: Traditional Reporting vs. Continuous Pentesting
Dec 13, 2024

Pentest Reports: Traditional Reporting vs. Continuous Pentesting

Vulnerability scanning as a service is a solution that uses cloud-based tools to identify vulnerabilities in an organization's digital infrastructure.
Application Security Testing (AST): Technologies and Best Practices
Nov 27, 2024

Application Security Testing (AST): Technologies and Best Practices

Application security testing involves analyzing and evaluating software applications to identify vulnerabilities.
Ultimate Guide to Conducting a Security Risk Assessment
Nov 22, 2024

Ultimate Guide to Conducting a Security Risk Assessment

Security risk analysis evaluates potential threats and vulnerabilities affecting an organization’s critical information security resources.
Top 8 Penetration Testing Types, Techniques, and Best Practices
Nov 21, 2024

Top 8 Penetration Testing Types, Techniques, and Best Practices

Penetration testing is a simulated cyber-attack against a computer system, network, or application to evaluate its security posture.
1 2 3 4 5