New & Notable
Penetration testing News
February 21, 2019
GitHub's bug bounty program for 2019 increases the reward money for researchers who find security vulnerabilities in the company's code.
February 19, 2013
Check out the top ten threats presented by enterprise mobile applications, according to the OWASP Mobile Security Project.
April 11, 2008
Not properly signing off on a software project's requirements limits the quality assurance (QA) team's ability to ensure that the software does as it's intended.
November 01, 2007
It's tempting to consider use case diagrams as context diagrams because they do show context. But having one diagram for both will result in an unreadable cloud of bubbles.
Penetration testing Get Started
Bring yourself up to speed with our introductory content
With pen testing, you uncover software's vulnerabilities before hackers do. Use this overview of the practice to learn about tooling options, test types, use cases and common flaws. Continue Reading
Is it fun to spend the day breaking stuff in a war room with your coworkers? Of course, but more than that, it's vital to the security and stability of certain applications. Continue Reading
Is penetration testing the same as red team engagement? There are similarities, but they're not the same. Understand the differences to improve your organization's cyberdefenses. Continue Reading
Evaluate Penetration testing Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
This one-stop test automation guide walks through the benefits and challenges, how to craft an automated testing strategy and how to compare tools. Continue Reading
The jailbreaking of iOS devices has a huge affect on security. It opens the door for malicious hackers, and not just via adventurous consumers. Continue Reading
This guide explains what's involved in addressing application security form a software tester's perspective by presenting common threats and strategies to deal with them. Continue Reading
Manage Penetration testing
Learn to apply best practices and optimize your operations.
Security professionals with coding skills can get a lot done in not a lot of time. Hear why Python suits beginners and how it puts security and developers on the same team. Continue Reading
Testing an organization's security maturity is crucial for an organization to improve their post-assessment posture. Learn how red teaming can help this situation with Matt Pascucci. Continue Reading
Software technology has impacted nearly everyone everywhere with the intention of improving lifestyles. However, when crucial security steps aren't being met, these technologies can take a catastrophic turn. To avoid hacking and other security ... Continue Reading
Problem Solve Penetration testing Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
For developers, security is not often a high priority -- but it should be. Automated security scanning tools can help detect and address weaknesses before evildoers discover them. Continue Reading
Testing expert Matthew Heusser attended CAST 2017 and was surprised to hear why testing less might lead to better software. Here are his key takeaways. Continue Reading
The internet of things is a challenge for software testers. Luckily, microservices and containers can make things more straightforward. Here's where to begin. Continue Reading