Why is Penetration Testing a Must for Banks and Financial Services?
Cybersecurity threats to financial services organizations are constantly evolving, and the need for robust security measures to protect customer data and confidential […]
Active vs Passive Reconnaissance in Cyber Security
Cyber Reconnaissance is an advanced form of cyber security intelligence gathering which involves gathering as much information about a target as possible […]
What Are The Different Types Of Penetration Testing? Everything You Need to Know
Penetration testing, also known as “pentesting” or “ethical hacking”, is a type of security testing used to evaluate the security of a […]
What is Cross-Site Request Forgery (CSRF)?
Cross-site request forgery (CSRF) is an attack technique that exploits the trust that a web application has in a user’s browser. It […]
What is HIPAA Penetration Testing?
HIPAA Penetration Testing HIPAA (Health Insurance Portability and Accountability Act) is a piece of legislation that was passed in 1996 in the […]
Sanitizing vs Encoding vs Escaping
Quite frankly, I cannot count how many times I’ve seen these 3 terms mixed up by folks at all levels in both […]
External vs Internal Penetration Testing
Penetration testing is a type of security testing that is used to assess the security of a computer system, or network. Penetration […]
Black Box vs Gray Box vs White Box Pentest
Penetration tests often get classified as either “black box pentest”, “white box pentest”, or even “gray box pentest’. However, cutting through the […]
What is a Secure SDLC?
A secure SDLC is a software development lifecycle that includes security at every stage of development from inception to retirement. The goal […]
7 Types of Penetration Testing to Zero in on Vulnerabilities
A penetration test simulates the actions of a hacker in a cyber attack against your computer systems in order to find exploitable […]
Reflected XSS Cross-Site Scripting
What is Reflected Cross-Site Scripting (XSS)? Reflected Cross-Site Scripting vulnerabilities are a subcategory of XSS vulnerabilities. Reflected XSS attacks occur when an […]