Penteraリソース

専門家のセキュリティ知識を活用。

私たちのセキュリティ・リソースを読んで、学習、成長しましょう。

October 14, 2024
The Case for Security Validation: An ROI Discussion
October 14, 2024
The Hacking Games – Hybrid Cloud Attack Surface Reduction
June 27, 2024
Becoming DORA Compliant with Automated Security Validation
May 2, 2024
Overcoming Credential Exposure Pentera + SpyCloud
May 1, 2024
State of Pentesting 2024: Key findings
March 31, 2024
Putting Cloud Security to the Stress Test
September 21, 2023
Black Hat Webinar – The LOLBAS Odyssey: Tracing the Path of Finding Hidden Gems in Executables
July 13, 2023
The hacking games: Think like a hacker Pentera Labs x AppSec meetup
June 29, 2023
Tackling tech debt: A CISO’s practical approach to managing legacy infrastructure
May 17, 2023
Vulnerability and exposure management at a turning point
December 1, 2022
The hacking games: Operation system vulnerabilities Pentera Labs x AppSec meetup
November 8, 2022
Scale security efficiency with automation
October 26, 2022
Cure your SIEM of alert fatigue
September 28, 2022
5 steps to mitigate the risk of credential exposure
September 7, 2022
How attractive is your attack surface to the adversary?
August 25, 2022
Cyber attacks explained: XSS vulnerability in Microsoft Azure functions by Pentera Labs