Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The British Space Agency mission is set to clean up space debris

Chinese hackers abuse Ivanti CSA Zero Day in attacks on French government, communications

The EU accelerates its transition to a circular economy with new initiatives

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Build resilience using automated pentting
Identity

Build resilience using automated pentting

userBy userMarch 26, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

“Boxers draw the biggest advantage from their sparring partners…”
– Epictetus, 50–135 AD

It will be handed over. My chin was pushed in. My knees are bent. The bell rings and both boxers meet in the centre and circle. Red throws three jabs, Feint dumps the fourth, and Bang lands his right hand in the center blue.

This isn’t the first day of Blue, and despite his solid defense in front of the mirror, he feels pressured. But something changed for the ring. Various punches, feints, strength – not like a simulation of his coach. Is my defense strong enough to withstand this? He wonders, do I even have defense?

His coach reassures him.

The same goes for cybersecurity. Although proper architecture, policies and security measures can be excluded, the minimum gap in defense allows attackers to raise knockout punches. The only way to test your preparation is to sparr and get pressured in the ring.

The difference between practice and real battles

In boxing, there are plenty of sparring partners. Every day, fighters step into the ring to hone their skills against real enemies. However, in cybersecurity, sparring partners are more sparse. The equivalent is penetration test, but in a typical organization, a pen test occurs at most twice a quarter at most. A wide range of preparation, contract with expensive specialist agents and standardize the environment to test. As a result, security teams often end up in months without facing genuine hostile activities. They are compliant, their hands are up and their chins are shoved. But are they resilient under attack?

Rare test results

1. Drift: Slow erosion of defense

When boxers go for a few months without sparring, their intuition dulls. He becomes a victim of a concept known as “inch.” There, he has the right defensive move, but he misses it in an inch and is caught by a shot that he knows how to defend. In cybersecurity, this is similar to configuration drift. Incremental changes in the environment, it leads to new users, outdated assets, no longer attending, or gradually losses in defensive calibration. Over time, gaps appear. Not because the defense is gone, but because it fell out of alignment.

2. Undetected gap: Shadow boxing limits

Boxers and their coaches have only been gained through training so far. Shadow boxing and drills are useful, but coaches don’t call for inconspicuous mistakes. Nor can they replicate the unpredictability of an actual opponent. There are just too many things that don’t work. The only way a coach can assess his boxer’s condition is to see how he is attacked and diagnose why.

Similarly, in cybersecurity, the attack surface is vast and constantly evolving. Pentest evaluations can predict any possible attack vectors and cannot detect all vulnerabilities. The only way to reveal the gap is to repeatedly test it against actual attack scenarios.

3. Limited Test Range: Risks of Partial Tests

Coaches need to see fighters being tested against a variety of opponents. He may be fine with opponents who mainly throw headshots, but what about body punchers and counter punchers? These could be areas of improvement. If your security team only tests against certain types of threats and doesn’t extend its scope to other exploits, even passwords and false obscurity are at risk of being exposed to weak access points discovered by attackers. For example, web applications may be secure, but what about leaked credentials or suspicious API integrations?

Context is important when it comes to prioritizing revisions

Not all vulnerabilities are knockout punches. Compensating cybersecurity controls can reduce risk, so that the unique style of boxers can compensate for technical flaws. Take Muhammad Ali by textbook standards, his defense was flawed, but his athleticism and adaptability could not touch him. Similarly, Floyd Mayweather’s low front hand might seem like a weakness, but his shoulder roll has turned it into a defensive force.

In cybersecurity, vulnerability scanners often highlight dozens, if not hundreds. But not all of them matter. All IT environments are different, and high-strength CVEs can be neutralized by compensation controls such as network segmentation and strict access policies. Context is important. Because it provides for things that require immediate attention and things that do not.

High cost of rare tests

The value of testing against real enemies is nothing new. The boxers are preparing for a fight. Cybersecurity teams will conduct penetration tests to enhance their defenses. But what if a boxer had to pay tens of thousands of dollars each time he sparred? Their learning only happens in the ring – fighting – and the cost of failure is devastating.

This is a reality for many organizations. Traditional penetration testing is expensive, time-consuming and often limited in scope. As a result, many teams only test once or twice a year and do not check their defense for several months. When an attack occurs, the gaps are exposed and the cost is high.

Continuous aggressive testing

To truly strengthen their defenses, organizations must move beyond the rare annual tests. Instead, you need continuous automated testing to emulate real attacks. These tools emulate hostile activity, reveal gaps, and provide actionable insights into where security controls are tightened, how to readjust defenses, and how to provide accurate fixes for repairs. Do it all at normal frequency and without the high cost of traditional testing.

Combining automated security verification with human expertise, organizations can maintain a strong defensive attitude and adapt to evolving threats.

Visit Pentera to learn more about automated Pentesting.

Note: This article is skillfully written and contributed by William Schaffer, Senior Sales Development Officer at Pentera.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleChemical water electrolysis can advance hydrogen production
Next Article How to find a new cryptocurrency to invest in
user
  • Website

Related Posts

Chinese hackers abuse Ivanti CSA Zero Day in attacks on French government, communications

July 3, 2025

A critical Cisco vulnerability in unified CM grants root access through static credentials

July 3, 2025

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

July 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The British Space Agency mission is set to clean up space debris

Chinese hackers abuse Ivanti CSA Zero Day in attacks on French government, communications

The EU accelerates its transition to a circular economy with new initiatives

A critical Cisco vulnerability in unified CM grants root access through static credentials

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

The Digital Twin Revolution: Reshaping Industry 4.0

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.