Felipe Ruiz
It's about time you relied on code-assisted pentesting
Here are some reasons why it would be prudent and beneficial to stop being reluctant to share your code for pentesting with a reputable cybersecurity company.
Jason Chavarría
Our pick of the hardest challenges for ethical hackers
We share what to us are the 10 most challenging ethical hacking certifications, so that you can choose your next one and even trace a path to help your career.
Jason Chavarría
Importance, types, steps, tools of pentesting, and more
Explore the world of penetration testing and gain understanding of how it bolsters your cybersecurity safeguards against emerging threats.
Felipe Ruiz
Description and critique of CEH certifications
Here's a description and a critique of the CEH founded on the question, "Should the person who has this certification be called a 'certified ethical hacker'?"
Felipe Ruiz
Tips for choosing a vulnerability management solution
If you are still wondering what you should pay more attention to when choosing a vulnerability management solution, we recommend you read this blog post.
Jason Chavarría
Vulnerability scanning and pentesting for a safer web
Learn how website and web app security scanning work, their role in vulnerability management, and why mix them with pentesting in vulnerability assessment.
Felipe Ruiz
Definitions, classifications and pros and cons
Learn what vulnerability scanners and vulnerability scanning are, what their classifications are, and what their pros and cons are.
Felipe Ruiz
How this process works and what benefits come with it
Learn about the vulnerability management process, its stages, and the benefits your organization can obtain by implementing it.
Felipe Ruiz
Get an overview of vulnerability assessment
Learn what vulnerability assessment is, why this IT systems evaluation process is important, what types exist, and how it relates to vulnerability management.