Today we embark on a new journey. One that will have even a bigger impact on our customers, as we continue to contend with the ever-evolving threat landscape and increased digital attack surface. While our name changed, the mission we set for ourselves when we wrote the first line of code, remains the same.
Modeling the real attacker behavior has been the guiding principle leading us on this path, and that’s still our rallying cry.
Our attack surface is growing exponentially, a shift to cloud workloads is on full speed, vulnerabilities are rocketing, adversaries are advancing their TTPs, ransomware attacks are the new normal, and security teams are struggling to keep pace.
Cybersecurity for the past decade has been as if we’re in a technological arms race.
- Adding additional walls, hopefully stronger, taller, thicker
- Acquiring detection and response technologies
- Finding every possible vulnerability and a patch-it-all approach
But still, data breaches continue to happen despite increased worldwide spend – projected to exceed $150 billion in 2021, according to Gartner. It just doesn’t add up. No simple way of saying that.
We knew, when we first started Pentera, that we needed to approach this problem differently.
Changing a paradigm often seems like mission impossible. You start questioning yourself, but you keep going and then… something happens. It catches fire, those who were devil’s advocates simply become advocates. They don’t say sorry, but that’s ok – we understand!
This is Pentera.
From early adopters to early majority, Pentera has crossed the chasm – with hundreds of customers that choose to validate their security programs automatically, reducing risk and increasing resilience, so that they know they’re ready!
As Pentera CEO, hand-in-hand with our investors, I’m proud of what we have accomplished and can’t wait for what’s to come.
- Superior technology – solving real-world problems in over 30 countries, across 18 verticals
- Our Penterians – distributed worldwide, solving our customers’ biggest challenges
- A unique culture – where the foundation of a customer-first mindset infuses the company from the first developer all the way to our executive management
I want to welcome our customers, partners, prospective clients, and all cybersecurity experts to join us virtually to Xposure, June 23 at 11 A.M. EDT where industry leaders from Splunk, Vectra, Exabeam, Pentera and more unite for an afternoon of content built by cyber experts for cyber experts.
Our agenda is action packed with threat researchers, CEO fireside chats, notorious hackers, & CISOs galore! Need we say more? Save your spot today.
CVE-2022-22948: Sensitive Information Disclosure in VMware vCenter
New zero-day vulnerability joins a chain of recently discovered vulnerabilities capable of operating an end-to-end attack on ESXi. Organizations should evaluate risk and apply vCenter client patches immediately. Executive Summary Pentera Labs’ Senior Security Researcher, Yuval Lazar, discovered an Information Disclosure vulnerability impacting more than 500,000 appliances running default vCenter Server deployments. This finding is...
4 steps to knowing your exploitable attack surface
Originally published on Dark Reading. According to a Cisco CISO Benchmark survey, 17% of organizations had 100,000 or more daily security alerts in 2020, and its trajectory has only increased. Source: Cisco 2020 CISO Benchmark Survey 2021 only followed this trend with a record year of newly-discovered CVEs – 20,137 to be exact, topping the...
The Security Miss in Misconfigurations: Taking a second look at firewall misconfigurations
Network misconfigurations take on many types and forms, and come about for many different reasons. Many of them stem from blind adherence to poorly-informed common practices or even just from simply not being aware that operating system configuration defaults inherently contain security misconfigurations. Let’s review 2 common misconfigurations to serve as our examples: Why closed...