<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>pentest Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/pentest/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/pentest/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Fri, 22 Nov 2024 03:27:09 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>pentest Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/pentest/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>ISO27001 Compliance: Why you need a Quality Penetration Test</title>
		<link>https://www.vertexcybersecurity.com.au/iso27001-compliance-why-you-need-a-quality-penetration-test/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=iso27001-compliance-why-you-need-a-quality-penetration-test</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 11 Nov 2024 04:30:42 +0000</pubDate>
				<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[ISO27001 Pen Test]]></category>
		<category><![CDATA[ISO27001 Penetration Test]]></category>
		<category><![CDATA[pentest]]></category>
		<category><![CDATA[Pentesting]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8980</guid>

					<description><![CDATA[ISO27001 is the gold standard for information security management systems (ISMS). It provides a framework for businesses to manage and protect their sensitive information. But achieving ISO 27001 compliance requires more than just ticking boxes. You need to demonstrate that your security controls are truly effective. That&#8217;s where penetration testing comes in. Penetration Testing is [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Low Quality Penetration Test? How Do You Know?</title>
		<link>https://www.vertexcybersecurity.com.au/how-to-tell-you-have-a-low-quality-penetration-test/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-tell-you-have-a-low-quality-penetration-test</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 19 Jan 2023 02:55:48 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[high quality penetration test]]></category>
		<category><![CDATA[high quality penetration test report]]></category>
		<category><![CDATA[high quality pentest]]></category>
		<category><![CDATA[low quality penetration testing report]]></category>
		<category><![CDATA[penetration testing report]]></category>
		<category><![CDATA[pentest]]></category>
		<category><![CDATA[pentests]]></category>
		<category><![CDATA[poor penetration testing report]]></category>
		<category><![CDATA[poor pentest report]]></category>
		<category><![CDATA[poor report]]></category>
		<category><![CDATA[quality penetration test]]></category>
		<category><![CDATA[quality penetration testing]]></category>
		<category><![CDATA[quality pentest]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4942</guid>

					<description><![CDATA[It can be difficult to tell that you have a low quality penetration test. Sometimes you receive lots of documents and other times very few. This does not tell you how much work has been performed finding vulnerabilities. Having more or less meetings with a Cyber company does not give an indication of their capabilities [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>How to avoid getting a low quality penetration test?</title>
		<link>https://www.vertexcybersecurity.com.au/how-to-avoid-getting-a-low-quality-penetration-test/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-avoid-getting-a-low-quality-penetration-test</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 19 Jan 2023 02:31:23 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[high quality]]></category>
		<category><![CDATA[low quality]]></category>
		<category><![CDATA[OSCP]]></category>
		<category><![CDATA[OSWE]]></category>
		<category><![CDATA[penetration test]]></category>
		<category><![CDATA[pentest]]></category>
		<category><![CDATA[pentests]]></category>
		<category><![CDATA[quality]]></category>
		<category><![CDATA[quality penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4940</guid>

					<description><![CDATA[There are many companies and individuals offering Penetration Testing (aka Pen Test) some with and some without Certifications.People make mistakes, which is why there are mistakes in code that cause vulnerabilities. This also means the Penetration Tester being human, will also make mistakes and potentially miss finding vulnerabilities. So the question is how do you [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Penetration Test vs Cyber Review vs Cyber Audit</title>
		<link>https://www.vertexcybersecurity.com.au/penetration-test-vs-cyber-review-vs-cyber-audit/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-test-vs-cyber-review-vs-cyber-audit</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Sun, 15 Jan 2023 23:09:36 +0000</pubDate>
				<category><![CDATA[Audit]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[cyber audit]]></category>
		<category><![CDATA[cyber review]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security audit]]></category>
		<category><![CDATA[cyber security review]]></category>
		<category><![CDATA[penetration test]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[pentest]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[security audit]]></category>
		<category><![CDATA[security review]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4919</guid>

					<description><![CDATA[The common way for a management or 3rd party to assess your Cyber Security is either through a Penetration Test and Cyber Audit. Doing both of these are also really good way to get a full picture of Cyber security by identifying most gaps and vulnerabilities at that point in time. It is surprising that [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
