SOLUTION SETS
NEWSLETTERS
LOGIN
Follow us on
Upload your Case Studies
JOIN CONTENTREE
SIGN UP
Vendors
Pentera
Pentera
Pentera
50 Solutions
Watch Vendor Video
Pentera
0 Solution Set
Search
Solutions
Ebook
Security Validation Advisory (SVA) Services Get more value with…
Ebook
Beyond IngressNightmare: Uncovering New Injection Vectors in…
Case Study
GISA Amplifies Team Efficiency with Automated Security Validation
Report
THE STATE OF PENTESTING 2025
Case Study
How Globe Telecom Secures its Expanding Portfolio with Automated…
Case Study
Forvia Scales Security Validation Across their Enterprise - Wide…
Guide
The Diary of a Cyber GOAT
Ebook
Pentera Credential Exposure Tests for Cyber Identity Risks From…
Ebook
Piping Hot Fortinet Vulnerabilities
Ebook
Blurring Boundaries: Deciphering the Risks of AWS SSM in Hybrid…
Ebook
You’ll Never SID’em Coming
Ebook
Reflective loading with Remote Memory Interactions: Controlling…
Ebook
DevalScript: The language of processes
Ebook
Digital Operational Resilience Act (DORA): Achieve Compliance…
Ebook
Pentera Platform: Reduce Your Exposure with Automated Security…
Ebook
Security Validation for the Financial Industry
Ebook
Pentera Core: Know that Your Internal Controls Block Attacks
Report
THE STATE OF PENTESTING 2024
Guide
THE BUYER’S GUIDE TO SECURITY VALIDATION
Guide
GUIDE TO CTEM ADOPTION
Ebook
Pentera RansomwareReady
Ebook
Pentera Cloud: Automated Cloud Penetration Testing
Case Study
Hibank Strengthens Cyber Resilience with Continuous Security…
Case Study
How Sycuan Casino Resort Improved its Security Validation Program
Ebook
Payment Card Industry Data Security Standard (PCI DSS): Achieve…
Case Study
How NHS Royal Bolton Hospital Centralized Cybersecurity for…
Case Study
How Wyndham Hotels & Resorts Continuously Tests Its Security…
Ebook
Not Another WebLogic Exploitation: The Road to Post Exploitation
Ebook
Credential Harvesting Using DHCP Spoofing
Ebook
Flying Under the EDR Radar
Ebook
CVE-2022-22948: Sensitive Information Disclosure in VMware…
Ebook
vScalation (CVE-2021-22015) Local Privilege Escalation in VMware…
Ebook
Breaking the Barriers of Segmentation
Ebook
Death by Default: Neglected network protocols you should know
Ebook
The Gateway to Control: Initiating Attacks on MSSQL Databases
Ebook
The LOLBAS Odyssey: Finding New LOLBAS, and How You Can, Too
Ebook
135 is the new 445 PsExec over Remote Procedure Calls
Ebook
Evading Detection: From Inception to Reality
Case Study
International Law Firm Yigal Arnon Embraces Automated…
Ebook
SECURITY VALIDATION FOR MANUFACTURERS
Report
THE STATE OF PENTESTING 2023
White Paper
Aligning Automated Penetration Testing And Risk Management
Case Study
Apria Healthcare Real-Time Security Validation
Case Study
South Staffordshire College Continuous Penetration Testing
Case Study
Automating Red Team Activities at one of the World’s Leading…
Ebook
The Good, Bad and Compromisable Aspects of Linux eBPF
Ebook
Who Stole My Cookies? XSS Vulnerability in Microsoft Azure…
Ebook
Bypassing “air-gapped” networks via DNS
Ebook
Pentera - A Superior Solution for BAS
Guide
A Guide to Achieving CAF Readiness