All Resources

Library

Explore our collection of resources, including blog articles, webcasts, and case studies.

All Resources

Attack Surface vs Attack Vector: Understanding the Difference
Dec 19, 2024

Attack Surface vs Attack Vector: Understanding the Difference

Penetration testing, or pentesting, simulates an attack on a system to evaluate its defenses. Vulnerability testing identifies and evaluates system security weaknesses.
Ahead of the Breach - Lorenzo Pedroncelli, Senior Manager at RSA Security
Dec 18, 2024

Ahead of the Breach - Lorenzo Pedroncelli, Senior Manager at RSA Security

Ahead of the Breach Podcast sits down with Lorenzo Pedroncelli, Senior Manager at RSA Security, to discuss his thoughts on identity security as a cornerstone of cybersecurity.
Penetration Testing vs Vulnerability Testing: 6 Key Differences
Dec 18, 2024

Penetration Testing vs Vulnerability Testing: 6 Key Differences

Penetration testing, or pentesting, simulates an attack on a system to evaluate its defenses. Vulnerability testing identifies and evaluates system security weaknesses.
Pentest Reports: Traditional Reporting vs. Continuous Pentesting
Dec 13, 2024

Pentest Reports: Traditional Reporting vs. Continuous Pentesting

Vulnerability scanning as a service is a solution that uses cloud-based tools to identify vulnerabilities in an organization's digital infrastructure.
What Is Vulnerability Scanning as a Service (VSaaS)?
Dec 12, 2024

What Is Vulnerability Scanning as a Service (VSaaS)?

Vulnerability scanning as a service is a solution that uses cloud-based tools to identify vulnerabilities in an organization's digital infrastructure.
Social Engineering: 9 Attack Techniques and 6 Defensive Measures
Dec 11, 2024

Social Engineering: 9 Attack Techniques and 6 Defensive Measures

Social engineering is a method used to manipulate people into divulging confidential information, enabling unauthorized access, or deploying malware.
« 7 8 9 10 11 »