Skip to main content

Blog

03.Jul.2019
Simon Roe, Product Manager Outpost24
Penetration testing, or pen tests, can be a confusing subject and the costs can sometimes spiral beyond what you originally budgeted for without adding value. So, is application pen testing an effective way of keeping your critical applications protected or should you look at exploring other options?

There are security experts who insist penetration testing is essential for application security, and you leave yourself open to BIG risks if you don’t do it regularly. However, not knowing the entire end to end process can be a major stumbling block to getting the best value and, crucially, could have a big impact on your bottom line and overall business security.
26.Feb.2019
Davey Winder, security journalist
Thanks mainly to an ever evolving threat landscape and regulators sharpening their teeth, cybersecurity has become a firm fixture on the agenda in boardrooms and in headlines of media reports alike. This has led, by and large, to a welcome increase in awareness of what 'good' cybersecurity is. With, perhaps, one important exception: mention penetration testing and brows furrow soon followed by the inevitable what's that and why is it relevant to my business question. Which is ironic, when you think about it, as testing the security of your applications, systems and processes is vital when the threats themselves are ever-changing.
15.Jan.2019
Outpost24
A Pen Test is an authorized simulated attack on a computer system, performed to evaluate the security of the system with the goal of informing the system owner of both weaknesses and strengths.
07.Aug.2018
Outpost24
Knowing your weakness is the best defense. Penetration testing involves running simulated hacking exercises against corporate networks, systems, and people to find out if they are vulnerable to an attack. Also called “white hat hacking” and “ethical hacking,” it is the process of allowing security professionals to hack your company like a malicious hacker would do to help uncover security weaknesses.
28.May.2018
Outpost24
A recent study shows that IT security pros are struggling to keep up with the technologies that drive digital transformation. New technologies in connectivity and virtual infrastructure are helping companies to innovate supply chains and digitalize customer experiences. The new opportunities offered, however, come with a set of new security challenges in the form of an expanded attack surface. This is a double-edged sword, increasingly becoming a boardroom issue – how do companies keep up with the pace of innovation (and competition) while protecting their critical assets from security breaches?
09.Feb.2018
Fernando Gallego, IT Security at Outpost24
In the digital age, web application penetration testing is one of the most critical elements of an organization’s vulnerability management program. In this blog post we will explain the role of penetration testing plays in protecting your organization against web-related exploitations

Looking for anything in particular?

Type your search word here