Automated penetration testing has become a new way to replace and/or complement the traditional manual penetration testing methods. In this…
According to Gartner, OT (Operational Technology) is “hardware and software that detects or causes a change, through the direct monitoring…
One of the most effective ways to identify security weaknesses is to simulate attacks with penetration testing vendors. Penetration testing…
There are many aspects to consider when it comes to cybersecurity. From using a secure host to adding firewalls…
There are as many reasons for businesses to routinely conduct penetration testing on IT infrastructure as there are new malware…
For this year's Halloween treat, we present Pentoma®'s support for private cloud and on-premise implementations. (more…)
Introduction This blog post focuses on the optimization process and evaluation of a single component used for outlier detection. We…
If you wanted to assess whether your home was secure, you’d look at it from the point of view of…
In just a few short years, applications have become the go-to way that most consumers connect to the internet. Something…