Komodo ResearchJul 7, 20234 min readThe Art of API Penetration Testing: A XXE Case Study UnveiledAs cybersecurity professionals, we've had our fair share of exhilarating moments in the realm of penetration testing. Picture this: a...
Komodo ResearchJun 19, 20234 min read5 Tips for Successful Penetration Testing: Unleashing the Art of Hacking for a Safer TomorrowAh, the exhilarating world of penetration testing! It's like being a burglar, but with a legal and moral compass guiding your actions. In...
Komodo ResearchJun 6, 20236 min readHow Penetration Testing Can Save Your Business from Costly and Damaging Cyber AttacksImagine this scenario: You are the owner of a successful online business that sells products or services to thousands of customers every...
Komodo ResearchMay 17, 20234 min readStrengthening Healthcare Security: Red Team's Penetration Testing SuccessIt was a dark and stormy night when the call came in. The healthcare organization was in trouble, and they needed help. Their sensitive...
Komodo ResearchFeb 3, 20234 min readPenetration Testing vs. Vulnerability Assessment – What's the Difference?Penetration testing and vulnerability assessment are both important tools used in the field of cyber security. They serve different...
Komodo ResearchOct 14, 20212 min readWhat is the Value of Penetration Testing and What to Look for in Pen Testing CompaniesWhy Penetration Testing? With data breaches projected to cost businesses an estimated loss of $6,000 billion in 2021, penetration testing...
Komodo ResearchJan 7, 20203 min readA Practical Guide to SOC 2 Compliance Becoming SOC 2 compliant is a good practice we see many companies take, here's how to do it.