Welcome to
A place to release your cyber-stress

IT Emergency

Having read the Equifax Data Breach Congress Report from December 2018, one can see that the alleged Chinese attackers did not need to work very hard. All they did was take advantage of a few expired security certificates, a non-patched Apache Struts software and utilize a few web shells that led into additional databases.

Before you even ask, the answer is yes, it could have been prevented. If only there was an effective way to continually pen-test the entire network and point to these non-critical vulnerabilities that can lead to a disastrous breach. Well, now there is - automated penetration testing. And it is here to stay.

  

Get CyberToons to your inbox

Having read the Equifax Data Breach Congress Report from December 2018, one can see that the alleged Chinese attackers did not need to work very hard. All they did was take advantage of a few expired security certificates, a non-patched Apache Struts software and utilize a few web shells that led into additional databases.

Before you even ask, the answer is yes, it could have been prevented. If only there was an effective way to continually pen-test the entire network and point to these non-critical vulnerabilities that can lead to a disastrous breach. Well, now there is - automated penetration testing. And it is here to stay.

  

All CyberToon strips

Feb 28

Pentesting Needs A Kick in The Butt

We all agree that we need more PT. Pentesting is the only proven way to emulate a real attack and test all your cyber- defense as a whole. However, there are many drawbacks that make it difficult to scale this highly-demanded service and have it done in a much higher frequency than the typical annual ceremony.

While more and more cybersecurity jobs remain unfilled and the learning curve to become an experienced pen-tester becomes even steeper, the silver lining remains in the domain of software and automation. It’s the time for automated penetration testing platforms!

  
CyberToon_with_Header (1)-1

We all agree that we need more PT. Pentesting is the only proven way to emulate a real attack and test all your cyber- defense as a whole. However, there are many drawbacks that make it difficult to scale this highly-demanded service and have it done in a much higher frequency than the typical annual ceremony.

While more and more cybersecurity jobs remain unfilled and the learning curve to become an experienced pen-tester becomes even steeper, the silver lining remains in the domain of software and automation. It’s the time for automated penetration testing platforms!

  
Load More