What is Penetration Testing?

Penetration testing also known as a pen testing identifies vulnerabilities which are exploited by certified professionals in an effort to penetrate your company’s network. A professional ethical hacker running the penetration test assess the network environment, find...

Continue Reading...

Penetration Testing as a Tool

If you are tasked with protecting your company's network and digital assets, you'll likely have a number of systems in place to protect your network. But have you tested them? This is where a pen test can help, allowing an ethical hacker to test your networks defences...

Continue Reading...

In order to ensure security throughout the entire organization, it is essential that applications are developed using secure coding standards and developed using a defensive coding strategy such as application threat modeling. Application threat modeling makes it possible to analyze the security of...

Continue Reading...

The Open Web Application Security Project (OWASP) is now considered to be the industry standard methodology for web application security and penetration testing. With the OWASP Top 10 2017 being the minimum standard web applications should be tested against. The OWASP project is run by volunteers co...

Continue Reading...

If your website is processing credit card data, you'll need to make PCI DSS v3.2 compliance a top priority. The standard sets out various security related compliance requirements that companies are required to have in place if they are processing credit card data. The standard exists to ensure customers cardholder data remains secure and helps to prevent payment card fraud.

Unfortuntely, statisitcal data shows that almost 80% of the companies seem to fail interim PCI compliance assessments. So, don't contribute to the 80% and take a glance at the 5 common PCI DSS v3.2 mistakes that companies make when attempting to obtain PCI DSS compliance.

Continue Reading...