A Tale of Two Penetration Tests
Two organizations, both seeking penetration tests, both acting in good faith — but with very different questions. What their approaches reveal about how companies actually buy security.
Blog Tag
20 articles on this topic
Two organizations, both seeking penetration tests, both acting in good faith — but with very different questions. What their approaches reveal about how companies actually buy security.
Based on 2025's penetration testing trends, here's what's coming in 2026: AI-generated code vulnerabilities, stricter compliance requirements, and why human-led security testing becomes non-negotiable.
SaaS breaches rose 300% while buyer confidence dropped to 32%. Here's why independent, CREST-accredited pen testing is now essential for enterprise contracts in 2025.
Finding a reputable penetration testing firm isn't hard if you know what to look for.
We are now CREST accredited, but what does that bring to our clients?
We are proud to announce that we are now CREST Penetration Testing accredited!
If you're starting to plan for penetration testing, you're on the right track.
Automated scanners cover known threats, but manual penetration testing is far more creative. That's where the main value of manual penetration testing lies.
Cyber attacks conjure up notions of shady programmers tucked away in a dark room typing away at their keyboards, furiously trying to siphon money from your bank account.
The average cost of a cyber attack is about 4.4 million dollars.
Cybersecurity experts discuss penetration tests and vulnerability assessments quite a bit. Both are important tools in your cybersecurity arsenal, but they're hardly interchangeable.
What is the timeline for a pen test?
It's 2024, and for some reason, many businesses still underestimate the likelihood of an attack on their web apps.
If you ask anyone who has seen their email or any other type of account hacked, the first thing they'll tell you is that the hack came as a major surprise.
If you're starting to plan for penetration testing, you're on the right track.
These days, almost every large organization performs red teaming exercises.
In the world of cyber security, it's possible to do everything right on the surface, and still get attacked by a malicious cyber hacker.
To the untrained eye, they have similar-sounding names, but penetration testing and vulnerability scanning are very different services.
People in the cybersecurity industry often try to make it seem like getting a penetration test is the end-all and be-all of cybersecurity. As usual, the issue is far more complex than that.
It's cyber security awareness month! Join us for this weeks theme, which is phone week! Protecting your mobile device is important, especially if you allow your users to bring their own devices to your network.