{"id":331,"date":"2024-03-12T04:52:59","date_gmt":"2024-03-12T04:52:59","guid":{"rendered":"https:\/\/cyberwissen.io\/pt\/solution\/managed-detection-and-response-copy\/"},"modified":"2024-03-25T09:38:15","modified_gmt":"2024-03-25T09:38:15","slug":"penetration-testing","status":"publish","type":"solution","link":"https:\/\/cyberwissen.io\/pt\/solution\/penetration-testing\/","title":{"rendered":"Penetration Testing"},"content":{"rendered":" \n<section class=\"\">\n    <div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-center\">\n  \n\n\n<div class=\"col-lg-6 col-xs-12 text-left\"> \n<div class=\"padR50\">\n\n  \n         \n      \n           <h4 class=\"blue\">What is Penetration Testing?<\/h4>\n\n         \n        \n   <div class=\"white\">   \n   <p>Penetration testing, or pentesting, is a form of ethical cyber security assessment that seeks to identify, safely exploit and help to remediate vulnerabilities across computer systems, applications and websites. By utilising the same tools and techniques used by cyber adversaries, pen testing replicates the conditions of a genuine attack.<\/p><br \/>\n   \n   \n \n\n \n       \n       \n         \n   \n    \n    \n   \n   <\/div>\n  \n   <div class=\"vGap25\"><\/div>\n      \n      \n\n   \n \n<\/ul>\n<\/div>\n\n<\/div>\n\n   <div class=\"col-lg-6 col-xs-12 text-left\"> \n<div class=\"padL50\">\n\n  \n         \n             <h4 class=\"blue\">Why perform penetration tests?<\/h4>\n\n       \n   <div class=\"white\">\n   \n      \n   \n   \n \n  \n\n   \n        \n    <ul class=\"simpleList\">\n\n         \n        <li>Rapidly fixes vulnerabilities<\/li>\n        \n          \n        <li>Provides independent assurance<\/li>\n        \n          \n        <li>Wmproves cyber risk awareness<\/li>\n        \n          \n        <li>Supports compliance requirements<\/li>\n        \n          \n        <li>Demonstrates security commitment<\/li>\n        \n          \n        <li>Informs future investments<\/li>\n        \n           <\/ul>\n\n    \n   \n   <\/div>\n  \n\n      \n      \n\n   \n \n<\/ul>\n\n <\/div>\n<\/div>\n  \n \n<\/div>\n    <div class=\"vGap15\"><\/div>\n<\/section>\n<br \/>\n<section id=\"\" class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-lg-8 col-xs-12  text-left\">\n<h4 class=\"primary uppercase\"> types of penetration testing<\/h4>\n<h3 class=\"  \"> <\/h3>\n<p class=\"xl\">\n<\/div><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row \">\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=622305140  fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/035-server-blue.svg\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Network Infrastructure Testing<\/h4>\n<p><p>CyberWissen rigorously investigates your network to identify and exploit a wide range of security vulnerabilities. This enables us to establish if assets such as data can be compromised, classify the risks posed to your overall cyber security, prioritise vulnerabilities to be addressed, and recommend actions to mitigate risks identified.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1775530803  fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/035-smartphone-blue.svg\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Web Application Testing<\/h4>\n<p><p>Web applications play a vital role in business success and are an attractive target for cybercriminals. CyberWissen\u2019s ethical hacking services include website and web app penetration testing to identify vulnerabilities including SQL injection and cross-site scripting problems plus flaws in application logic and session management<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1563035700  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/034-vulnerability-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Wireless Testing<\/h4>\n<p><p>Unsecured wireless networks can enable attackers to enter your network and steal valuable data. Wireless penetration testing identifies vulnerabilities, quantifies the damage these could cause and determines how they should be remediated.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=170302354  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/035-antivirus-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Social Engineering<\/h4>\n<p><p>People continue to be one of the weakest links in an organisation\u2019s cyber security. CyberWissen\u2019s social engineering pen test service includes a range of email phishing engagements designed to assess the ability of your systems and personnel to detect and respond to a simulated attack exercise.<\/p>\n<p><\/p>\n<p>&nbsp;<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1794562352  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/035-backdoor-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Cloud penetration<\/h4>\n<p><p>With specific rules of engagement set by each provider, cloud penetration testing is not straightforward. Our range of custom cloud security assessments can help your organisation overcome these challenges by uncovering and addressing vulnerabilities that could leave critical assets exposed.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1254075637  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/034-data-security-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Mobile Security Testing<\/h4>\n<p><p>Mobile app usage is on the rise, with more and more companies enabling customers to conveniently access their services via tablets and smartphones. CyberWissen carries out in-depth mobile application assessments based on the latest development frameworks and security testing tools.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/section>\n<section class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-left\">\n<div class=\"col-lg-8 col-xs-12 text-left\">\n<h4 class=\"primary uppercase\"> Why your organisation needs a pen test <\/h4>\n<h3 class=\"  \">With threats constantly evolving, it&#8217;s recommended that every organisation testing at least twice a year, but more frequently when: <\/h3>\n<div class=\"vGap25\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"row\">\n<div class=\"col-lg-12 col-xs-12\">\n      <\/div>\n<\/p><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row\">\n<div class=\"col-lg-12 col-xs-12 text-center\">\n      <img data-opt-id=2017631882  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/infograph_pentration.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" style=\"width:80% !important; margin:0 auto;\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap15\"><\/div>\n<\/div><\/div>\n<\/div>\n<\/section>\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n \n<section class=\"\">\n    <div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-center\">\n  \n\n\n<div class=\"col-lg-6 col-xs-12 text-left\"> \n<div class=\"padR50\">\n\n  \n         \n      \n           <h4 class=\"blue\">What is agile penetration testing?<\/h4>\n\n         \n        \n   <div class=\"white\">   \n   <p>Agile penetration testing is a continuous security assessment approach that allows companies to speed up the delivery of secure software to their customers. Unlike traditional pen testing which has the potential to slow down product teams, when properly integrated within the SDLC, agile penetration testing can keep pace with your release schedule. This saves your organisation the time and expense of remediating issues that could have been identified much earlier in the process. Agile pen testing is a programmatic way to unearth and remediate potential risks in an application within the existing timelines and schedules of product releases.<\/p><br \/>\n   \n   \n \n\n \n       \n       \n         \n   \n    \n    \n   \n   <\/div>\n  \n   <div class=\"vGap25\"><\/div>\n      \n      \n\n   \n \n<\/ul>\n<\/div>\n\n<\/div>\n\n   <div class=\"col-lg-6 col-xs-12 text-left\"> \n<div class=\"padL50\">\n\n  \n         \n             <h4 class=\"blue\">Agile penetration testing service features:<\/h4>\n\n       \n   <div class=\"white\">\n   \n      \n   \n   \n \n  \n\n   \n        \n    <ul class=\"simpleList\">\n\n         \n        <li>Enhancing development sprint plans to include the appropriate level of security assessment required<\/li>\n        \n          \n        <li>Strategising \u201cabuse cases\u201d for every release through a rapid threat modelling exercise ahead of development <\/li>\n        \n          \n        <li>Validating countermeasures to the abuse cases along with exploratory threat scenarios through an agile pen testing exercise post-development<\/li>\n        \n          \n        <li>Logging of any potential vulnerabilities directly on development platforms such as JIRA Azure DevOps etc. for remediation<\/li>\n        \n          \n        <li>Validating the applied fix (remediation) by conducting an optional retesting exercise<\/li>\n        \n          \n        <li>Analysing vulnerability patterns scoring time to fix and other critical statistics and communicating program improvement.<\/li>\n        \n           <\/ul>\n\n    \n   \n   <\/div>\n  \n\n      \n      \n\n   \n \n<\/ul>\n\n <\/div>\n<\/div>\n  \n \n<\/div>\n    <div class=\"vGap15\"><\/div>\n<\/section>\n<br \/>\n<section id=\"\" class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-lg-8 col-xs-12  text-left\">\n<h4 class=\"primary uppercase\"> AGILE PENETRATION TESTING benefits<\/h4>\n<h3 class=\"  \"> <\/h3>\n<p class=\"xl\">\n<\/div><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row \">\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1408589897  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/039-spyware-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Reduction in vulnerabilities<\/h4>\n<p><p>Over time, the backlog of software vulnerabilities decreases and security posture improves.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=828661857  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/041-cloud-server-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Improved communication<\/h4>\n<p><p>Development and security teams seamlessly communicate to adapt testing to new features and priorities.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1838171779  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/040-remote-access-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Better secure development practices<\/h4>\n<p><p>Ongoing feedback and collaboration enables developers to implement better secure development practices in new code.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=484317607  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/040-password-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Closer insurance relationships<\/h4>\n<p><p>CyberWissen has extensive relationships with 50+ cyber insurance brokers and carriers worldwide and exclusive<\/p>\n<p>benefits to insured companies.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/section>\n<section id=\"\" class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-lg-8 col-xs-12  text-left\">\n<h4 class=\"primary uppercase\"> AGILE ASSESSMENT LIFECYCLE<\/h4>\n<h3 class=\"  \"> <\/h3>\n<p class=\"xl\">\n<\/div><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row \">\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=2131030378  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/025-credit-card-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Release and  Sprint Planning<\/h4>\n<p><p>CyberWissen team joins release planning meetings to get contextual knowledge of applications and understand what is being developed for the upcoming testing cycle.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=880692027  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/025-browser-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Track and Scope<\/h4>\n<p><p>CyberWissen agile pentesting team defines the scope and coverage, provides estimates and assigns resources based on requirements.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=142580692  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/024-server-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Sprint Review<\/h4>\n<p><p>The broader team meets to confirm what has been developed and remediated in that sprint.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1646804302  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/024-speedometer-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Agile Cycle<\/h4>\n<p><p>Active penetration testing takes place, following the agreed framework.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=337724660  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/025-network-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Sprint Retro<\/h4>\n<p><p>Identified vulnerabilities are logged and tracked and feedback and analysis is provided for future planning. The cycle then restarts with release and sprint planning.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Our Penetration testing, are designed to simulation of real-world cyber-attack in order to test your organization\u2019s cybersecurity capabilities and expose vulnerabilities. <\/p>\n","protected":false},"featured_media":2733,"template":"","meta":{"inline_featured_image":false},"class_list":["post-331","solution","type-solution","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/solution\/331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/solution"}],"about":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/types\/solution"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media\/2733"}],"wp:attachment":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media?parent=331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}