PEN Consultants Logo
Don’t Be a Victim: Find your weaknesses before the criminals do. PEN Consultants can help!

Category: Ethical Hacking

2024-04-11

Breaching a Network With Risk-Accepted Vulnerabilities - ICS2 Alamo Chapter Meeting - April 2024

It was an honor to be invited to speak at the ICS2 Alamo Chapter Meeting this month! For those that missed it, here is a version of the presentation. Topic: Breaching a Network With Risk-Accepted Vulnerabilities

2023-06-08

What is Penetration Testing?

What is Penetration Testing? Penetration testing, which some may refer to as “ethical hacking” or “white hat hacking”, is the practice of testing a computer system, network, web application, or even people, to find vulnerabilities an attacker could exploit. Penetration testers use much of the same knowledge, tools, and techniques as malicious hackers, but they […]

2023-04-28

Breaching a Network With Risk-Accepted Vulnerabilities

How many of the vulnerabilities from your last penetration test report did you risk accept? Everything with a Medium severity or lower? This article is intended to help you reconsider that mindset. Be careful about disregarding penetration testing findings just because they are not High or Critical severities by themselves. Companies are breached every day […]

2023-04-17

5 Benefits of Hiring an Ethical Hacker for Your Business

5 Benefits of Hiring an Ethical Hacker for Your Business: Hacking has been around for centuries, but it wasn’t until the 1950s, when computers became more widely available, hacking, as we know it today, began to emerge. In the early days of computing, hackers were mostly just curious individuals who explored computer systems for fun […]

magnifiercrosschevron-down