Penetration Testing

Penetration Testing – Manual vs Automated

Penetration Testing – Manual vs Automated

Automated penetration testing has become a new way to replace and/or complement the traditional manual penetration testing methods. In this…

5 years ago

Operational Technology Security – the Security Blind Spot

According to Gartner, OT (Operational Technology)  is “hardware and software that detects or causes a change, through the direct monitoring…

5 years ago

7 Common Mistakes in Penetration Testing

One of the most effective ways to identify security weaknesses is to simulate attacks with penetration testing vendors. Penetration testing…

5 years ago

How Penetration Testing Helps Securing Businesses

  There are many aspects to consider when it comes to cybersecurity. From using a secure host to adding firewalls…

6 years ago

4 Things to Know About Penetration Testing & AI

There are as many reasons for businesses to routinely conduct penetration testing on IT infrastructure as there are new malware…

6 years ago

Pentoma®’s Support for Private Cloud & On-Prem Implementations

For this year's Halloween treat, we present Pentoma®'s support for private cloud and on-premise implementations. (more…)

6 years ago

Tweaking (extended) Isolation Forests

Introduction This blog post focuses on the optimization process and evaluation of a single component used for outlier detection. We…

6 years ago

An Introduction to Penetration Testing

If you wanted to assess whether your home was secure, you’d look at it from the point of view of…

7 years ago

What is the Difference between Vulnerability Scanning and Penetration Testing?

In just a few short years, applications have become the go-to way that most consumers connect to the internet. Something…

8 years ago