Tel Aviv – Boston – October 27, 2022 – Pentera, the leader in automated security validation today announced that it has been named a winner in the Black Unicorn Awards for 2022. The award is given to the 10 most innovative, successful infosec companies who are changing the landscape in cybersecurity. The winning companies all demonstrate high growth revenues and rapid trajectory through execution and market adoption.
“The existing cybersecurity paradigm is flawed. The current focus on vulnerability management does not enable companies to understand their true organizational risk and is therefore ineffective towards reducing exposure,” said Aviv Cohen, CMO of Pentera. “By continuously challenging existing security controls in production, Pentera’s platform validates the effectiveness of their security against real-world hacking tactics, enabling surgical remediation to reduce risk exposure. We’re extremely honored to be named a Black Unicorn for 2022. Our selection is a reflection of the incredible work of the entire Pentera team and underscores the value that we are providing to the market.”
Pentera’s Automated Security Validation platform enables users to dramatically improve security readiness and ability to defend against cyber threats. Emulating the real-world techniques of hackers across the entire cyberattack kill-chain, Pentera continuously challenges existing cybersecurity controls to provide security teams with an actionable roadmap to reduce security exposure.
“We’re pleased to name Pentera as a winner among the small, but elite group of cybersecurity industry leaders in our annual Black Unicorn awards,” said Gary Miliefsky, Chairman & CEO of Cyber Defense Media group. “With the rate of cyberattacks continuing to rise around the world, the market needs innovative and dynamic solutions like Pentera’s to meet the evolving challenges to our security.”
Want to work with a 2022 Black Unicorn? Pentera is currently looking to fill more than 60 open positions worldwide. To apply please visit: https://pentera.io/careers/
How we improved our QA with Shift-Left testing
This article is part of Pentera’s Engineering Series – a behind-the-scenes look at the technologies we develop to keep companies secure. In this piece, we look at the testing processes that we use to QA our platform and deliver a high-quality solution. It almost goes without saying that testing is a critical part of the...
Five steps to mitigate the risk of credential exposure
Every year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or in data dumps shared by cybercriminals. These credentials are often used for account takeover attacks, exposing organizations to breaches, ransomware, and data theft. While CISOs are aware of growing identity threats and have multiple tools in their...
WiFi – The Untested Attack Surface
Much of a company’s assets are connected to Wi-Fi networks. However, security teams are often less likely to validate these networks. This pushed us to wonder what we might find if we were to test a corporate WiFi network. After running the Pentera platform™️ over Wi-Fi, we found several vulnerabilities, which helped us gain insight...