Articles about pentesting

Enterprises shift to software-based pentesting

Pentesting penetration testing

The latest State of Pentesting report from Pentera reveals that over 50 percent of enterprise CISOs now report using software-based pentesting to support their in-house testing practices.

Based on research conducted by Global Surveyz, the report notes that 50 percent of CISOs now identify software-based testing as a primary method for uncovering exploitable security gaps within their organizations.

Continue reading

Organizations fix under half of exploitable vulnerabilities

Vulnerability security

The latest State of Pentesting report from Cobalt reveals that organizations are fixing less than half of all exploitable vulnerabilities, with just 21 percent of GenAI app flaws being resolved.

It also highlights a degree of over-confidence with 81 percent of security leaders saying they are 'confident' in their firm's security posture, despite 31 percent of the serious findings discovered having not been resolved.

Continue reading

Everything an IT pro needs to know about penetration testing

Penetration-testing-pentest

The vast majority of IT professionals will agree that in cybersecurity, waiting for an attack to happen in order to expose weaknesses is a losing strategy.

As such, many will be well-clued up on the benefits of penetration testing; from demonstrating a commitment to protecting sensitive data and ensuring ongoing compliance with industry regulations, to gaining a clearer understanding of security gaps, and strengthening incident response readiness.

Continue reading

Save $43.99! Get 'The Ultimate Kali Linux Book, Third Edition' for FREE

The-Ultimate-Kali-Linux-Book

Embark on an exciting journey into the world of Kali Linux -- the central hub for advanced penetration testing, and harness Nmap, Metasploit, Aircrack-ng, and Empire.

Honing your pentesting skills and exploiting vulnerabilities or conducting advanced penetration tests on wired and wireless enterprise networks, Kali Linux empowers cybersecurity professionals. In its latest third edition, The Ultimate Kali Linux Book goes further to guide you on how to setup your labs and explains breaches using enterprise networks.

Continue reading

Get 'Kali Linux Penetration Testing Bible' (worth $25) for FREE

Kali-Linux-Penetration-Testing-Bible

Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali’s varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali.

You’ll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether you’re new to the field or an established pentester, you’ll find what you need in this comprehensive guide.

Continue reading

Over half of CISOs expect frozen or lower budgets in 2024

Budget cut reduction piggy bank

A new State of Pentesting report from Pentera shows that 53 percent of organizations surveyed have decreasing or stagnating cybersecurity budgets, requiring CISOs to do more with less.

This compares to last year when 92 percent of organizations surveyed expected to raise their IT security budgets. Only five percent of CISOs this year are projecting their IT security budgets will grow by more than 10 percent compared to 36 percent in 2023.

Continue reading

Which comes first? The pentest or the bug bounty program? [Q&A]

Software testing

Bug bounty and penetration testing programs are often grouped as interchangeable, but they perform distinct functions.

To determine whether both deserve a place within a cybersecurity strategy, it is important to understand their specific qualities and how they have matured over recent years. We spoke to Chris Campbell, lead solutions engineer at HackerOne, to learn more.

Continue reading

A better way to conduct enterprise penetration testing

Software testing


Penetration testing for enterprise security operationalizes the function of security testing for an organization's offensive security program.

Centralizing penetration testing into a core function of the enterprise can provide significant ROI; however, it also requires a new level of considerations, that when applied correctly, can significantly improve overall security outcomes.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.