Why Your Organization Should Conduct a Physical Penetration Test

Posted by Melanie Klag on Oct 14, 2019 10:30:00 AM
Read More

Topics: "Pentesting", "Penetration Testing", Physical Penetration Test

The Importance of Web Application Penetration Testing

Posted by Melanie Klag on Oct 8, 2019 10:46:00 AM
Read More

Topics: "Pentesting", "Cybersecurity", "Penetration Testing", Application Security

How Penetration Testing Can Help Your Organization Direct Cybersecurity Spending

Posted by Melanie Klag on Sep 27, 2019 12:17:18 PM
Read More

Topics: "Pentesting", "Cybersecurity"

Cost Benefits of a Penetration Test

Posted by Kelly Konya on Dec 3, 2018 4:31:00 PM

For security professionals, it can be difficult to go to the decision-makers in a company and demand that a certain amount of money is spent on penetration testing. Rather, there must be justification for the expense, and the expenditure needs to ultimately contribute to the company’s profitability. If the decision-makers don’t understand the impact pen testing can have, they will never agree to the expense.

However, ROI from services like these is not always clear.

In order to justify the need for penetration testing, security professionals must qualify and quantify the “what” and the “why” of the service. This article will explore the potential returns an organization can expect from a penetration test.

Read More

Topics: "Pentesting", "Cybersecurity", "Penetration Testing"

Core Elements of Effective Penetration Test Remediation

Posted by Kelly Konya on Oct 2, 2018 2:20:00 PM

A penetration test, or a “pen test,” involves a variety of both manual and automated techniques that simulate a cyberattack on an organization’s data and security.



To prioritize a holistic approach to cyber defense, organizations need to understand the environment under protection, the anomalies affecting the security of the system and—most importantly—the plan for remediation.

When reported and carried out properly, penetration tests can identify an organization’s security weaknesses and avenues of attack. With this knowledge, organizations can uncover the information and support that’s required to mitigate or remove those vulnerabilities.

Once your organization receives the test results, it’s time to prioritize your remediation efforts based on the most critical items. These items will be the most obvious points that malicious attackers will attempt to use to exploit your systems.

As you begin to measure your resources and develop your timeframe for remediation, there are several core elements you must keep in mind.

Read More

Topics: "Pentesting", "Cybersecurity", "Penetration Testing"

Key Components of an Effective Penetration Test

Posted by Kelly Konya on Sep 14, 2018 2:13:00 PM

Penetration testing, or “pen testing,” is a vital part of every cyber defense program.

Read More

Topics: "Pentesting", "Cybersecurity", "Penetration Testing"