Zero-Day Pen Testing Under Fire

A blog post I wrote recently about using zero-day exploits for testing seems to have ruffled some feathers: I got a flood of email about why the concept is immoral, tests like that are not valid, and a host of other problems. Rather than responding to emails individually, this post answers a few common grievances … Read more

NetSPI Goes All-In on Proactive Security, Unveils Unified Platform

Updates to NetSPI’s technology and brand will enable customers to take a proactive approach to cybersecurity with more clarity, speed, and scale than ever before MINNEAPOLIS, May 1, 2024 /PRNewswire/ — Further cementing itself as the proactive security solution, NetSPI today unveiled a new unified platform alongside updated branding to address customer need for proactive security. … Read more

Top cybersecurity students attack at RIT’s Collegiate Penetration Testing Competition | RIT

Fifteen of the best student cybersecurity teams from around the globe battled in the Collegiate Penetration Testing Competition global finals Jan. 11-14 at RIT. This year, teams pentested a mock airport. In one scenario (pictured), students hacked a baggage claim system. The world’s greatest collection of cybersecurity talent assembled at Rochester Institute of Technology Jan. … Read more

12 Penetration Testing Certification Options To Know | Built In

These cybersecurity credentials prove you’re a hacker with a heart of gold. Penetration testing is a lot like hacking. Both involve scanning devices, software and wireless networks for tiny security vulnerabilities. The only difference is the underlying intentions: penetration testers work for tech companies, reporting any cybersecurity issues so they can get patched. Hackers intend … Read more

How To Become A Cybersecurity Penetration Tester: Salary, Education And Job Outlook – Forbes Advisor

You might be using an unsupported or outdated browser. To get the best possible experience please use the latest version of Chrome, Firefox, Safari, or Microsoft Edge to view this website. Often going by the title of “penetration tester,” ethical hackers work for a variety of businesses to test their network security measures against possible … Read more