by Gerdien van den Bosch | Apr 4, 2022 | Cybersecurity, Information security
When it comes to keeping your organization off the radar of cyberattacks, there are two types of cybersecurity tests that are recommended: penetration testing and red teaming. They are often used interchangeably, although they are two different things. So, how do you...
by Gerdien van den Bosch | Jul 12, 2021 | Cybersecurity, Information security
Web application penetration testing means testing the security integrity of browser-based applications. All potentially vulnerable web-based services, including APIs and web interfaces, are checked. This is done by executing the same steps that malicious attackers...
by Gerdien van den Bosch | Oct 21, 2020 | Cybersecurity, Information security
We explain why a penetration test is an essential security measure for any company Penetration testing may raise many questions in your team. Regularly, we get asked about the purpose of a Penetration test. A reasonable question because an unknown team of pentesters...
by Gerdien van den Bosch | Sep 23, 2020 | Cybersecurity, Information security, Security tips
Cybercriminals are exploiting the situation of the pandemic to launch highly sophisticated cyberattacks on every industry possible. In the first six months of 2020, companies became the target of massive data breaches where hackers sold account credentials, sensitive...
by Gerdien van den Bosch | Aug 19, 2020 | Information security, Security tips
Cloud is amongst the biggest trends and technologies these days because of its exceptional benefits. Migration of mobile, web or desktop-based application to the cloud, enables organizations to stay connected with their target markets by allowing them to access the...
by Gerdien van den Bosch | Mar 16, 2020 | Cybersecurity, Information security
As a security company, we often get asked what the most important factor is involved in safeguarding companies’ data assets. Cybersecurity may begin with putting in place measures like spam filters, fraud detection software, multi-factor authentication and file...