Blogposts about cyber security in general, pentest, cloud security and red teaming from our team.
In this context, there are pentests in the information security management system (ISMS)
As penetration tests are usually carried out in IT laboratories, ISO/IEC 17025 can also be applied to this type of test.
The TIBER-DE framework (Threat Intelligence-based Ethical Red Teaming) is an indigenous framework for simulating cyber attacks in Germany.
An HTTP reverse proxy can be used to improve phishing simulations by switching between the client and the target server.
This article highlights the six criteria, defined by the BSI, that need to be considered in a pentest.
Pentests can be carried out by an analyst on site or remotely. This article is intended to explain the advantages and disadvantages of the 2 options.
Schedule a no-obligation initial consultation with one of our sales representatives. Use the following link to select an appointment: