The Best Apps for Keeping Notes: Pros & Cons
What is the best note-taking application for pentesters? It’s a hot debate, and if you prefer to watch than read then we recently compared many of the popular options in this video. Otherwise, let’s take a look at what each app has on offer to help you decide what’s...
Save Time During your Next Pentest
Pentesting is inherently time-consuming. This constraint alone has led to the rise of scanners as well as the exclusion of regular pentesting in many modern development lifecycles. Whilst we can’t automate and deliver everything at lightspeed, there are things we can...
What is an Internal Penetration Test?
Introduction An internal penetration test is a simulated attack on a network or system conducted from within an organization’s internal network. The objective of an internal penetration test is to identify vulnerabilities and weaknesses in the network or system...
Penetration Testing – From Adversary to Partner
While penetration testing can be considered “adversarial” testing, it should be anything but that. Your penetration test, no matter who you do it with, should be a partnership. In every partnership, communication is key. Settling for a pentest company that merely...
