TCM Pentester Certification Roadmap

TCM Pentester Certification Roadmap

What is the purpose of a pentester certification? What should you know? What should you be able to do? If you pass a TCM exam, you can rest assured that you can do what a pentester does – because you did it during the exam. Our associate-level pentest exam, The...
How Often Should You Have A Pentest?

How Often Should You Have A Pentest?

One of the most common questions that can directly impact an organization’s cybersecurity posture is “How often should we do a pentest?” It’s a fair question because managing cybersecurity isn’t just about checking boxes – it’s also about protecting your business in a...
Differences Between a Vulnerability Scan and a Penetration Test

Differences Between a Vulnerability Scan and a Penetration Test

Overview Two of the most common questions clients ask are: What’s the difference between a vulnerability scan and penetration test and what option is best for my company? The differences between a vulnerability scan and penetration test are often confused. Let’s take...
Social Engineering And External Pentests

Social Engineering And External Pentests

Should Social Engineering Be In-Scope For An External Pentest? The short answer is yes; social engineering should be included in the scope of any serious external penetration test.  Any test of the perimeter defense of an organization’s network without social...
What is a Penetration Testing Report?

What is a Penetration Testing Report?

What separates a good guy (white hat) from a bad guy (black hat)? The bad guy will either hack you for profit or hold your information for ransom in exchange for monetary gain or brand damage. The good guy will tell you what is insecure about your company, and most...