Today we embark on a new journey. One that will have even a bigger impact on our customers, as we continue to contend with the ever-evolving threat landscape and increased digital attack surface. While our name changed, the mission we set for ourselves when we wrote the first line of code, remains the same.
Modeling the real attacker behavior has been the guiding principle leading us on this path, and that’s still our rallying cry.
Our attack surface is growing exponentially, a shift to cloud workloads is on full speed, vulnerabilities are rocketing, adversaries are advancing their TTPs, ransomware attacks are the new normal, and security teams are struggling to keep pace.
Cybersecurity for the past decade has been as if we’re in a technological arms race.
- Adding additional walls, hopefully stronger, taller, thicker
- Acquiring detection and response technologies
- Finding every possible vulnerability and a patch-it-all approach
But still, data breaches continue to happen despite increased worldwide spend – projected to exceed $150 billion in 2021, according to Gartner. It just doesn’t add up. No simple way of saying that.
We knew, when we first started Pentera, that we needed to approach this problem differently.
Changing a paradigm often seems like mission impossible. You start questioning yourself, but you keep going and then… something happens. It catches fire, those who were devil’s advocates simply become advocates. They don’t say sorry, but that’s ok – we understand!
This is Pentera.
From early adopters to early majority, Pentera has crossed the chasm – with hundreds of customers that choose to validate their security programs automatically, reducing risk and increasing resilience, so that they know they’re ready!
As Pentera CEO, hand-in-hand with our investors, I’m proud of what we have accomplished and can’t wait for what’s to come.
- Superior technology – solving real-world problems in over 30 countries, across 18 verticals
- Our Penterians – distributed worldwide, solving our customers’ biggest challenges
- A unique culture – where the foundation of a customer-first mindset infuses the company from the first developer all the way to our executive management
I want to welcome our customers, partners, prospective clients, and all cybersecurity experts to join us virtually to Xposure, June 23 at 11 A.M. EDT where industry leaders from Splunk, Vectra, Exabeam, Pentera and more unite for an afternoon of content built by cyber experts for cyber experts.
Our agenda is action packed with threat researchers, CEO fireside chats, notorious hackers, & CISOs galore! Need we say more? Save your spot today.
Why Gartner is Calling External Attack Surface Management (EASM) a Critical Functionality
External Attack Surface Management (EASM) tools are not new, but only this year has Gartner named this category as a top trend to keep an eye on in 2022. So, why does the top research & consulting firm think its time has come? The main reason is the relentless expansion of the digital footprint of...
The Good, Bad and Compromisable Aspects of Linux eBPF
2022 discoveries of new privilege escalation techniques Reading this blog will allow you to understand the eBPF mechanism and how a fairly small bug can lead to the compromise of the entire system. Executive summary Modern hacking techniques often use legitimate operating system tools for bad purposes. Such is the potential case with the common...
CVE-2022-22948: Sensitive Information Disclosure in VMware vCenter
New zero-day vulnerability joins a chain of recently discovered vulnerabilities capable of operating an end-to-end attack on ESXi. Organizations should evaluate risk and apply vCenter client patches immediately. Executive Summary Pentera Labs’ Senior Security Researcher, Yuval Lazar, discovered an Information Disclosure vulnerability impacting more than 500,000 appliances running default vCenter Server deployments. This finding is...