Blog Posts

Should I use Continuous Vulnerability Assessment?

When it comes to protecting your organization from cyber threats, one of the most important decisions you will make is whether or not to use continuous vulnerability assessment. A vulnerability assessment is a process of identifying, quantifying, and prioritizing (by using a risk management framework) the vulnerabilities in an organization's IT systems, applications and infrastructure.

Read More

How do I select someone to do vulnerability assessments?

When it comes to selecting a vendor to perform vulnerability assessments, there are a few key factors to consider. First and foremost, it's important to understand the difference between a vulnerability assessment and a penetration test. A vulnerability assessment is a non-intrusive evaluation of your organization's systems, networks, and applications to identify and assess any vulnerabilities that could be exploited by an attacker. A penetration test, on the other hand, is a simulated attack on your systems, networks, and applications to test the effectiveness of your security controls.

Read More
cybersecurity, pentest, vulnerability assessment Christian Grupp cybersecurity, pentest, vulnerability assessment Christian Grupp

What is the difference between a penetration test and a vulnerability assessment?

When it comes to cybersecurity, penetration testing and vulnerability assessments are two important tools that are used to identify and assess security risks. However, these two terms are often used interchangeably, which can be confusing for non-technical users. In this blog post, we will discuss the difference between a penetration test and a vulnerability assessment, written for a non-technical user to understand.

Read More
cybersecurity, vulnerability assessment Christian Grupp cybersecurity, vulnerability assessment Christian Grupp

How often should I run vulnerability assessments on my business?

Vulnerability assessments are an important aspect of cybersecurity for small businesses, as they help identify and evaluate vulnerabilities in a computer system, network, or web application that could be exploited by cybercriminals. Determining how often to conduct a vulnerability assessment for a small business can be a challenging task. The frequency of your vulnerability assessments should be based on various factors such as industry, regulation, insurance requirements, and risk of the specific business. In this blog post, we will discuss the different factors that should be considered when determining the frequency of vulnerability assessments for small businesses and provide guidelines on how often they should be conducted.

Read More

What is the difference between credentialed and uncredentialed vulnerability assessments?

Vulnerability assessments are a critical component of an organization's cybersecurity strategy, as they help identify and prioritize vulnerabilities that could be exploited by attackers. There are two main types of vulnerability assessments: credentialed and uncredentialed. In this blog post, we will discuss the key differences between these types of assessments and the pros and cons of each approach, written for a non-technical user to understand.

Read More
vulnerability assessment, cybersecurity Christian Grupp vulnerability assessment, cybersecurity Christian Grupp

How do vulnerability assessments and pen-testing impact my insurance?

Vulnerability assessments and penetration testing (pen-testing) are important aspects of cybersecurity that help identify and evaluate vulnerabilities in a computer system, network, or web application that could be exploited by cybercriminals. These assessments also play a crucial role in determining the level of insurance coverage a company can receive. In this blog post, we will discuss how vulnerability assessments and pen-testing impact insurance and the importance of conducting regular assessments for companies.

Read More
vulnerability assessment, cybersecurity Christian Grupp vulnerability assessment, cybersecurity Christian Grupp

Who needs vulnerability assessments?

Vulnerability assessments are an important aspect of cybersecurity, as they help identify and evaluate vulnerabilities in a computer system, network, or web application that could be exploited by cybercriminals. Determining who should run vulnerability assessments for a company can be a challenging task. The decision of who should run the assessment should be based on various factors such as the size of the company, risk profile, industry, regulatory environment, laws, insurance needs, and other elements that may be important in determining the scope and frequency of the assessments. In this blog post, we will discuss the different factors that should be considered when determining who should run vulnerability assessments for a company.

Read More