Penetration Testing_ManualvsAutomated

Penetration Testing – Manual vs Automated

Automated penetration testing has become a new way to replace and/or complement the traditional manual penetration testing methods. In this post, we’ll explore the concept of automated penetration testing, and how it helps organizations to discover and mitigate security weaknesses in comparison to manual penetration testing.

Operational Technology Security – the Security Blind Spot

According to Gartner, OT (Operational Technology)  is “hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events.” OT is common in Industrial Control Systems (ICS), such as SCADA (Supervisory Control and Data Acquisition) systems. 

7 Common Mistakes in Penetration Testing

One of the most effective ways to identify security weaknesses is to simulate attacks with penetration testing vendors. Penetration testing aims to find loopholes in organizations’ web architecture so that they can be fixed and patched before malicious attackers exploit them. 

10 Cost-Effective Security Tips for SMBs

Cybersecurity is essential for every organization, not only for enterprises but also for SMBs and startups. Cybersecurity threats loom around businesses to take advantage of them. This is why security by design is crucial for organizations as it could reduce the overall security cost by 70% compared to adding a security strategy at a later stage.

8 Recommendations for Web Application Security

Software development is a complex process that typically requires a lot of time and effort. The pressure on developers to churn out new features and meet deadlines is immense, which means coders often do not have the time and flexibility to follow secure development best practices as they would prefer. 

How Penetration Testing Helps Securing Businesses

  There are many aspects to consider when it comes to cybersecurity. From using a secure host to adding firewalls and plugging different types of security measures, businesses are often overwhelmed. However, adding proper security measures helps them prevent potential attacks and minimize risks. To help organizations, NIST (National Institute of Standards and Technology) provides the cybersecurity framework, which consists…

4 Things to Know About Penetration Testing & AI

There are as many reasons for businesses to routinely conduct penetration testing on IT infrastructure as there are new malware and cybersecurity threats that, unfortunately, seem to pop up every day. Reading news accounts of damages brought about by the WannaCry and NotPetya malware attacks is an impetus for many organizations. For others, penetration testing is a business imperative. Does…

Tweaking (extended) Isolation Forests

Introduction This blog post focuses on the optimization process and evaluation of a single component used for outlier detection. We implemented our own forest inspired solution as part of our meta learning framework. Although our usage and applied implementation are quite different, we share the (fun part of the) journey. We will limit the scope of the blog post, and…


Something went wrong. Please refresh the page and/or try again.

Follow My Blog

Get new content delivered directly to your inbox.