top of page
BLOG
Search
Komodo Research
Jul 7, 20234 min read
The Art of API Penetration Testing: A XXE Case Study Unveiled
As cybersecurity professionals, we've had our fair share of exhilarating moments in the realm of penetration testing. Picture this: a...
67 views0 comments
Komodo Research
Jun 19, 20234 min read
5 Tips for Successful Penetration Testing: Unleashing the Art of Hacking for a Safer Tomorrow
Ah, the exhilarating world of penetration testing! It's like being a burglar, but with a legal and moral compass guiding your actions. In...
101 views0 comments
Komodo Research
Jun 6, 20236 min read
How Penetration Testing Can Save Your Business from Costly and Damaging Cyber Attacks
Imagine this scenario: You are the owner of a successful online business that sells products or services to thousands of customers every...
40 views0 comments
Komodo Research
May 17, 20234 min read
Strengthening Healthcare Security: Red Team's Penetration Testing Success
It was a dark and stormy night when the call came in. The healthcare organization was in trouble, and they needed help. Their sensitive...
72 views0 comments
Komodo Research
Feb 3, 20234 min read
Penetration Testing vs. Vulnerability Assessment – What's the Difference?
Penetration testing and vulnerability assessment are both important tools used in the field of cyber security. They serve different...
184 views0 comments
Komodo Research
Oct 14, 20212 min read
What is the Value of Penetration Testing and What to Look for in Pen Testing Companies
Why Penetration Testing? With data breaches projected to cost businesses an estimated loss of $6,000 billion in 2021, penetration testing...
314 views0 comments
Komodo Research
Jan 7, 20203 min read
A Practical Guide to SOC 2 Compliance
Becoming SOC 2 compliant is a good practice we see many companies take, here's how to do it.
710 views0 comments
bottom of page