Not all penetration tests are created equal, but they can and should be your secret weapon in your IT or security toolbox. With tighter budgets and a shortage of skills, choosing services and vendors that provide real added value is all the more important, so we’ll be busting through some of the pentesting myths and noise in the market to help you do that!
For the next interview in our series, we really enjoyed catching up with Matthew Bryant who shared his thoughts on how the role of the CISO has changed over the last 20 years, top tips for managing budgetary pressures, and advice for those currently on their journey to security leadership.
In today’s world, cyber attacks are becoming increasingly common and sophisticated, making it essential for businesses to take necessary measures to protect their assets. There are many different approaches that a company can take to evaluate their security posture and protect themselves against cyber threats, and two of the most common approaches are security assessments and penetration tests. While both are critical components of a comprehensive security program within an organisation, the two terms are often used interchangeably despite the fact there are significant differences between them. But what is the difference between them?
“Communicating cyber risk is hard to do well and it’s really easy to burn credibility with the board. It is however one of the crucial practices that defines today’s security leadership, and the stakes have never been higher, so it’s critical that we get it right.” James Lyne