Penetration Testing, Security Program, Risk Assessment, Red Team

Penetration Testing – Stories from the Field by William Suthers

William gets to the point of what a pen test should do for your business and how to avoid costly mistakes.

Read More

Penetration Testing, Security Program, Threat Intelligence, Ransomware

Don't Let Ransomware Kill Your Business: Address the Root Causes

In today's digital age, businesses increasingly rely on technology, making them more vulnerable to cyber-attacks. One of the most dangerous forms of cyber-attacks is ransomware, which can cripple businesses of all sizes. Ransomware is malware that

Read More

SOC2, Penetration Testing, Security Program, Privacy

How HealthTech Startups use Security as a Competitive Advantage

HealthTech is among the most well-funded and rapidly growing industries. However, the medical sector is one of the most challenging areas for launching a startup. Laws, regulations, high security & privacy standards, and the complexity of

Read More

SOC2, Penetration Testing, Security Program, Privacy

The FTC Safeguards Rule – What it Means to Your Business

When it comes to cybersecurity, privacy & compliance, the road forward is often unclear. The recently amendedFTC Safeguards Rule (Title 16 Chapter 1 Subchapter C Part 314, 'Standards for Safeguarding Customer Information') went into effect

Read More

Penetration Testing, Security Program, Risk Assessment, Privacy, Threat Intelligence

Cuba Ransomware Attacks Five Critical Sectors in the US

Nowadays, the perpetrators of ransomware have gotten more clever in their methods, using complex strategies such as double extortion, in which they not only encrypt the victim's files but also threaten to reveal vital data if the ransom is not paid.

Read More

PCI DSS, Penetration Testing

Pentesting for PCI DSS

Most industry-recognized security frameworks, including HITRUST, CIS Controls and PCI DSS, stipulate penetration testing requirements as part of an organization's risk management cycle. In addition, the Payment Card Industry Security Standards

Read More

Penetration Testing, Security Program

The Top Five Criteria for Selecting Your Penetration Testing Vendor

The ROI on Pen Testing varies widely depending on the vendor you choose. Here are some tips for making a smart choice. Penetration testing also known as offensive security testing, is in high demand due to the unquenchable need for continuous

Read More

Penetration Testing, CIS Controls, Security Program

What does the CIS Controls Version 8 say about Pen Testing?

Independent penetration testing provides critical objective insights about vulnerabilities in organizational defenses and mitigating controls. As part of a comprehensive, ongoing security improvement, pen tests are required by recognized

Read More

Penetration Testing

Why you should Pen Test like an Attacker & not an Auditor

Penetration testing uses creative, blended attacks like real-world adversaries to find weaknesses in tested systems. By simulating real-world attack scenarios, pen testing is

Read More

Penetration Testing, Security Program, Risk Assessment

Why API Pen Tests Should go First

In today's interconnected world, application programming interfaces (APIs) have rapidly become predominant tools for sharing data and providing multiple services within a single application. APIs link ecosystems of technology and are an engine of

Read More