Ray EspinozaLessons From Breweries and Security Teams: The Importance of Thinking Long-TermBrewing and pentesting have something in common: they both take time to get it right.Oct 19, 2020Oct 19, 2020
Ray EspinozaHow to Plan an Annual Pentest ProgramIn this article, Ray Espinoza will take a closer look at how to set your pentest program up for success by nailing the planning stage.Sep 4, 2020Sep 4, 2020
Ray EspinozaThe Lifecycle of a Pentest ProgramBreaking Down the Steps of the Pentest Program LifecycleAug 17, 2020Aug 17, 2020
Ray EspinozaA Programmatic Approach to PentestingA pentest program is a planned series of pentests designed to systematically identify and resolve vulnerabilities in one or more assetsJul 8, 2020Jul 8, 2020
Ray EspinozaHow to Become SOC 2 Type 1 Certified and Elevate Your Status in a Competitive Business AtmosphereYour customers are looking for assurance that you have security properly baked into your systems.May 21, 2020May 21, 2020
Ray EspinozaAnnouncing SOC 2 Type 1 Certification: A Commitment to Our CustomersAs an application security company, offering our customers the highest level of confidence in our own security practices is critical.May 8, 2020May 8, 2020
Ray Espinoza4 Simple Steps to Protect Your Organization from Ransomware AttacksFor a well-prepared organization, ransomware poses a very manageable risk. Explore steps you can take to protect your organization.Apr 30, 2020Apr 30, 2020
Ray EspinozaWhat is Threat Intelligence and How Does it Relate to Pentesting?In this article, we’ll explain what threat intelligence is, how it relates to pentesting, and how it can help your organization.Feb 24, 2020Feb 24, 2020
Ray EspinozaUnderstanding the Anatomy of an AttackLessons Learned from the Capital One BreachNov 21, 2019Nov 21, 2019
Ray EspinozaWhat a SaaS Provider Should Know about SOC 2 ComplianceSOC 2 auditing is a voluntary way to ensure that they are performing up to industry standards for data security.Nov 5, 2019Nov 5, 2019