Don't Be a Victim

Find your weaknesses before the criminals do - PEN Consultants can help!


We locate vulnerabilities in your systems.


We mimic the actions of a hacker while maintaining confidentiality, integrity, and availability of your data and systems.


We provide an actionable plan to protect your data.

What Clients Are Saying

Jason Keogh

Jason Keogh

VP of Products

...our customers are directly and immediately benefiting...

Mickey Henry

Mickey Henry

President costs were 50-80% less than the other penetration testing vendor quotes...

Dr. Kevin Harrison

Dr. Kevin Harrison


...identified student data vulnerable to hackers...


How do I get into Cybersecurity?

How do I get into Cybersecurity? I’m often asked questions such as, “How do I get into Cybersecurity?” or “How do I get from an IT role a cybersecurity role?”. This is a copy/paste, with Read more…

Your Schema is Showing

Your Schema is Showing Here’s a look at the results from our recent effort analyzing GraphQL API endpoints across the web, and the percentage of those endpoints that allowed an unauthenticated user to view the Read more…

Building a Security Testing Business

Building a Security Testing Business I am often asked, “How did you get started with your security testing business?” “What are some lessons learned?” “What are your current challenges?” I have been asked enough times Read more…

HTTP Response Headers

HTTP Response Headers While preparing for a monthly Lunch-and-Learn lesson for a client, I wanted to collect various examples of good, bad, faulty, and missing HTTP response headers. As is typical, I went a little Read more…

MFA Implementation Attacks

MFA Implementation Attacks Most Multi-Factor-Authentication (MFA) implementations do not protect your password from brute forcing or from account level DoS attacks. This article will demonstrate various attacks that exploit weaknesses found in nearly every industry Read more…

© PEN Consultants, LLC 2013 -