<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reputed Pen Testing Companies to use in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13574#M410</link>
    <description>&lt;P&gt;From experience, it does not matter who it is - ensure they are carefully supervised.&amp;nbsp; Had a situation on a private cloud, where by the Big 4 pen tester, was given access to an internal 10 Gbit switch port, and decided to unleash the throttle without first checking with the client and associated team first.&amp;nbsp; The resultant chaos, certainly had the Incident Response going for a little while. &amp;nbsp; It does not matter, who they are, ensure they are supervised and monitored carefully.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
    <pubDate>Tue, 14 Aug 2018 05:11:18 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2018-08-14T05:11:18Z</dc:date>
    <item>
      <title>Reputed Pen Testing Companies to use</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/12712#M340</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry if this post does not fit the content here. I would appreciate if esteemed members could suggest reputed names for engaging them for pen testing of SaaS-based service with desktop/mobile and browser clients.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jul 2018 18:29:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/12712#M340</guid>
      <dc:creator>2012</dc:creator>
      <dc:date>2018-07-23T18:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: Reputed Pen Testing Companies to use</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13053#M354</link>
      <description>&lt;P&gt;I have heard good things about Black Hills Information Security in the pentesting arena:&lt;/P&gt;&lt;P&gt;Here is their website:&lt;/P&gt;&lt;P&gt;&lt;A title="BHIS info" href="https://www.blackhillsinfosec.com/" target="_self"&gt;https://www.blackhillsinfosec.com/&lt;/A&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jul 2018 13:56:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13053#M354</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2018-07-31T13:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: Reputed Pen Testing Companies to use</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13145#M364</link>
      <description>&lt;P&gt;Thank you CISO Scott.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Aug 2018 17:04:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13145#M364</guid>
      <dc:creator>2012</dc:creator>
      <dc:date>2018-08-02T17:04:41Z</dc:date>
    </item>
    <item>
      <title>Re: Reputed Pen Testing Companies to use</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13162#M368</link>
      <description>&lt;P&gt;If you want a regular subscription based service, with immediate real time results, rather than having to wait for Statement of Work overheads - then you may find this useful:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ibm.com/security/services/penetration-testing" target="_blank"&gt;https://www.ibm.com/security/services/penetration-testing&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Thu, 02 Aug 2018 20:27:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13162#M368</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-08-02T20:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: Reputed Pen Testing Companies to use</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13356#M399</link>
      <description>&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Aug 2018 03:35:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13356#M399</guid>
      <dc:creator>2012</dc:creator>
      <dc:date>2018-08-08T03:35:09Z</dc:date>
    </item>
    <item>
      <title>Re: Reputed Pen Testing Companies to use</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13573#M409</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In case still consider you should go with Big4 (EY, KPMG, PwC, Delloitte) for not just pentest but more consultant &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 03:25:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13573#M409</guid>
      <dc:creator>viethanguyen</dc:creator>
      <dc:date>2018-08-14T03:25:46Z</dc:date>
    </item>
    <item>
      <title>Re: Reputed Pen Testing Companies to use</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13574#M410</link>
      <description>&lt;P&gt;From experience, it does not matter who it is - ensure they are carefully supervised.&amp;nbsp; Had a situation on a private cloud, where by the Big 4 pen tester, was given access to an internal 10 Gbit switch port, and decided to unleash the throttle without first checking with the client and associated team first.&amp;nbsp; The resultant chaos, certainly had the Incident Response going for a little while. &amp;nbsp; It does not matter, who they are, ensure they are supervised and monitored carefully.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 05:11:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13574#M410</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-08-14T05:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: Reputed Pen Testing Companies to use</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13594#M412</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/478310579"&gt;@viethanguyen&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In case still consider you should go with Big4 (EY, KPMG, PwC, Delloitte) for not just pentest but more consultant &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;In my personal opinion going with a big 4 or even another pen testing company you need to be careful. I have found that pen testers who are reputable&amp;nbsp;AND good&amp;nbsp;will not do a pen test for you for more than 2 years in a row. Sometimes the big 4 or others who do not specialize in pen testing are just in it for the money. I have seen one company come in for 6 years straight and they were just tool monkeys. They ran Nessus, spit out the results and told the OIG how bad the company's IT staff was. They provided no analysis, no solutions, just you need to patch and you are so bad because you have 13,000 vulnerabilities across your 3 networks.&lt;/P&gt;&lt;P&gt;I was brought in as a new ISSO, I had to bite my tongue in the out brief meeting because I was new and still under probation but I wanted to stand up and say this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"You guys are nothing but tool-monkeys, which means we could have brought in monkeys and had them run the tool and got the same results. Your analysis is flawed because&amp;nbsp;you incorrectly stated we have 13,000 vulnerabilities. We have 3 identical networks, dev, test, and prod. So really we have the same 4,333 vulnerabilities 3 times. Secondly, you offer no solutions about the core problem. You know nothing of how our company works, despite having been running the SAME pentest for 6 years. The problem is not the &lt;U&gt;number&lt;/U&gt; of vulnerabilities, the problems are various and not even being dealt with because you just keep pointing out the big number. Problem #1 is that we have a bad IT setup. The government staff are all managers who manage IT contractors to do the work. We have no federal IT staff that are actually able to do the patch management. #2 is the fact we have written bad IT contracts and security and IT are not brought into the contract writing portion of the contracts. Our current contract says the IT contractors will patch Windows, Oracle, and RedHat. It does nothing to address 3rd party patching or other security solutions for which a patch is not available, but manual solutions exist. Even though the contractor is technically able to remediate it, if they were to screw something up, because it is not written in their contract, they could be thrown off of the contract. They are not going to take that risk. #3 Because you just keep reporting numbers and offering no solutions, Everyone is pointing fingers at each other, which further delays the response. #4 Because you keep bringing back the same team year after year and doing the same things you always do, we have no idea if you are competent at your task. Brining in a new set of eyes by using a different company will show different things. That is why COMPETENT pen-testing companies do no more than 2 years in a row before suggesting that you use someone else. If a company is suggesting rotating pen-testing companies that is a good indication that they know what they are doing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had only been on the job for 6 months and had already pointed out several problems within the IT sphere. Unfortunately for me, I was young in my InfoSec career and did not know about how things like company culture would be a roadblock for my successes. I banged my head against a wall throwing good ideas after good ideas not realizing that, even though my security analysis was good and correct, the way I was presenting it was making IT look like fools so they were resistant to my good ideas and started building walls around it. They had the mentality that they were a small obscure federal agency (who only had about a billion in funds they were managing) so they weren't anybody's target. No one would even think to go after them. It wasn't until later, after I started in my Master's program that I learned about Organizational Culture and how I had to address that while making my suggestions, in order for them to accept them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I would ask, when selecting a pen-test company, what is their suggestion for length of contract? If they say over two years, I would be suspicious.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 13:28:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13594#M412</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2018-08-14T13:28:47Z</dc:date>
    </item>
    <item>
      <title>Re: Reputed Pen Testing Companies to use</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13617#M413</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/478310579"&gt;@viethanguyen&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;In case still consider you should go with Big4 (EY, KPMG, PwC, Delloitte) for not just pentest but more consultant &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;The Big $ (oh, sorry, I left my finger on the shift key too long, that should be Big 4)&amp;nbsp; are &lt;STRONG&gt;extremely&lt;/STRONG&gt; good at finding problems in your security posture that can be addressed by consulting they can sell you ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 17:52:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13617#M413</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-08-14T17:52:20Z</dc:date>
    </item>
    <item>
      <title>Re: Reputed Pen Testing Companies to use</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13954#M424</link>
      <description>&lt;P&gt;If you're&amp;nbsp;EMEA based you could examine the CREST of CHECK list of companies&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.crest-approved.org/member-companies/index.html" target="_blank"&gt;https://www.crest-approved.org/member-companies/index.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Aug 2018 14:08:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/13954#M424</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2018-08-24T14:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: Reputed Pen Testing Companies to use</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/82944#M5072</link>
      <description>&lt;P&gt;Read also:&amp;nbsp;&lt;A href="https://qualysec.com/top-20-best-penetration-testing-companies-in-the-uk/" target="_blank"&gt;https://qualysec.com/top-20-best-penetration-testing-companies-in-the-uk/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Aug 2025 12:32:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/82944#M5072</guid>
      <dc:creator>karishmaqualyse</dc:creator>
      <dc:date>2025-08-08T12:32:37Z</dc:date>
    </item>
    <item>
      <title>Re: Reputed Pen Testing Companies to use</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/82961#M5074</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1293641443"&gt;@karishmaqualyse&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A quick question on Google AI came up with the following companies:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Several companies offer reputable SaaS-based penetration testing services, including Cybri, NetSPI, Cobalt, Bishop Fox, Rhino Security Labs, Informer (Bugcrowd), and Veracode. &lt;/SPAN&gt;&lt;SPAN&gt;These companies provide various levels of service, from expert-led, compliance-focused testing to continuous, automated assessment platforms.&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;Here's a more detailed look at some of these companies and their offerings: &lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;1. &lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/search?client=firefox-b-d&amp;amp;cs=1&amp;amp;sca_esv=22ad96beb70fd0c9&amp;amp;sxsrf=AE3TifPu1_IQrvn8OFzTO3DgRP9aaW6yfw%3A1754718885449&amp;amp;q=Cybri&amp;amp;sa=X&amp;amp;ved=2ahUKEwj8wcyehf2OAxUTzDgGHXkLGSkQxccNegQICxAB&amp;amp;mstk=AUtExfApB_Ywcb1n9yOpS_tydnzKeid9O_fH6GTpHbGzcLLKyA-s631cfOld5gzxFTbVPjLa_Dd53Sn3i902cr43HQSYCWVXqG6nNdwYeLJ7mqa5zU_e9OKqwYrp_haAwXqivaFf3SYhJ1W_nJkDDz4KhP1dLat2weBaun8pRDfPsKZZRHk&amp;amp;csui=3" target="_blank" rel="noopener"&gt;Cybri&lt;/A&gt;:&lt;/SPAN&gt; &lt;A class="" href="https://cybri.com/blog/best-saas-penetration-testing-companies/" target="_blank" rel="noopener"&gt;CYBRI provides expert-led, compliance-aligned penetration testing as a service (PTaaS)&lt;/A&gt; tailored specifically for SaaS applications.&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;2. &lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/search?client=firefox-b-d&amp;amp;cs=1&amp;amp;sca_esv=22ad96beb70fd0c9&amp;amp;sxsrf=AE3TifPu1_IQrvn8OFzTO3DgRP9aaW6yfw%3A1754718885449&amp;amp;q=NetSPI&amp;amp;sa=X&amp;amp;ved=2ahUKEwj8wcyehf2OAxUTzDgGHXkLGSkQxccNegQIERAB&amp;amp;mstk=AUtExfApB_Ywcb1n9yOpS_tydnzKeid9O_fH6GTpHbGzcLLKyA-s631cfOld5gzxFTbVPjLa_Dd53Sn3i902cr43HQSYCWVXqG6nNdwYeLJ7mqa5zU_e9OKqwYrp_haAwXqivaFf3SYhJ1W_nJkDDz4KhP1dLat2weBaun8pRDfPsKZZRHk&amp;amp;csui=3" target="_blank" rel="noopener"&gt;NetSPI&lt;/A&gt;:&lt;/SPAN&gt; Known for enterprise-grade PTaaS, NetSPI integrates with CI/CD pipelines and DevOps workflows.&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;3. &lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/search?client=firefox-b-d&amp;amp;cs=1&amp;amp;sca_esv=22ad96beb70fd0c9&amp;amp;sxsrf=AE3TifPu1_IQrvn8OFzTO3DgRP9aaW6yfw%3A1754718885449&amp;amp;q=Cobalt&amp;amp;sa=X&amp;amp;ved=2ahUKEwj8wcyehf2OAxUTzDgGHXkLGSkQxccNegQIFBAB&amp;amp;mstk=AUtExfApB_Ywcb1n9yOpS_tydnzKeid9O_fH6GTpHbGzcLLKyA-s631cfOld5gzxFTbVPjLa_Dd53Sn3i902cr43HQSYCWVXqG6nNdwYeLJ7mqa5zU_e9OKqwYrp_haAwXqivaFf3SYhJ1W_nJkDDz4KhP1dLat2weBaun8pRDfPsKZZRHk&amp;amp;csui=3" target="_blank" rel="noopener"&gt;Cobalt&lt;/A&gt;:&lt;/SPAN&gt; Offers agile PTaaS with a focus on rapid launch and a global network of testers.&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;4. &lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/search?client=firefox-b-d&amp;amp;cs=1&amp;amp;sca_esv=22ad96beb70fd0c9&amp;amp;sxsrf=AE3TifPu1_IQrvn8OFzTO3DgRP9aaW6yfw%3A1754718885449&amp;amp;q=Bishop+Fox&amp;amp;sa=X&amp;amp;ved=2ahUKEwj8wcyehf2OAxUTzDgGHXkLGSkQxccNegQIGBAB&amp;amp;mstk=AUtExfApB_Ywcb1n9yOpS_tydnzKeid9O_fH6GTpHbGzcLLKyA-s631cfOld5gzxFTbVPjLa_Dd53Sn3i902cr43HQSYCWVXqG6nNdwYeLJ7mqa5zU_e9OKqwYrp_haAwXqivaFf3SYhJ1W_nJkDDz4KhP1dLat2weBaun8pRDfPsKZZRHk&amp;amp;csui=3" target="_blank" rel="noopener"&gt;Bishop Fox&lt;/A&gt;:&lt;/SPAN&gt; Specializes in red teaming and continuous offensive testing for complex SaaS platforms.&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;5. &lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/search?client=firefox-b-d&amp;amp;cs=1&amp;amp;sca_esv=22ad96beb70fd0c9&amp;amp;sxsrf=AE3TifPu1_IQrvn8OFzTO3DgRP9aaW6yfw%3A1754718885449&amp;amp;q=Rhino+Security+Labs&amp;amp;sa=X&amp;amp;ved=2ahUKEwj8wcyehf2OAxUTzDgGHXkLGSkQxccNegQIHRAB&amp;amp;mstk=AUtExfApB_Ywcb1n9yOpS_tydnzKeid9O_fH6GTpHbGzcLLKyA-s631cfOld5gzxFTbVPjLa_Dd53Sn3i902cr43HQSYCWVXqG6nNdwYeLJ7mqa5zU_e9OKqwYrp_haAwXqivaFf3SYhJ1W_nJkDDz4KhP1dLat2weBaun8pRDfPsKZZRHk&amp;amp;csui=3" target="_blank" rel="noopener"&gt;Rhino Security Labs&lt;/A&gt;:&lt;/SPAN&gt; Provides in-depth manual testing, particularly for cloud-native and high-risk SaaS applications.&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;6. &lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/search?client=firefox-b-d&amp;amp;cs=1&amp;amp;sca_esv=22ad96beb70fd0c9&amp;amp;sxsrf=AE3TifPu1_IQrvn8OFzTO3DgRP9aaW6yfw%3A1754718885449&amp;amp;q=Informer+%28Bugcrowd%29&amp;amp;sa=X&amp;amp;ved=2ahUKEwj8wcyehf2OAxUTzDgGHXkLGSkQxccNegQIIxAB&amp;amp;mstk=AUtExfApB_Ywcb1n9yOpS_tydnzKeid9O_fH6GTpHbGzcLLKyA-s631cfOld5gzxFTbVPjLa_Dd53Sn3i902cr43HQSYCWVXqG6nNdwYeLJ7mqa5zU_e9OKqwYrp_haAwXqivaFf3SYhJ1W_nJkDDz4KhP1dLat2weBaun8pRDfPsKZZRHk&amp;amp;csui=3" target="_blank" rel="noopener"&gt;Informer (Bugcrowd)&lt;/A&gt;:&lt;/SPAN&gt; Offers real-time PTaaS with continuous asset discovery capabilities.&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;7. &lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/search?client=firefox-b-d&amp;amp;cs=1&amp;amp;sca_esv=22ad96beb70fd0c9&amp;amp;sxsrf=AE3TifPu1_IQrvn8OFzTO3DgRP9aaW6yfw%3A1754718885449&amp;amp;q=Veracode&amp;amp;sa=X&amp;amp;ved=2ahUKEwj8wcyehf2OAxUTzDgGHXkLGSkQxccNegQIJxAB&amp;amp;mstk=AUtExfApB_Ywcb1n9yOpS_tydnzKeid9O_fH6GTpHbGzcLLKyA-s631cfOld5gzxFTbVPjLa_Dd53Sn3i902cr43HQSYCWVXqG6nNdwYeLJ7mqa5zU_e9OKqwYrp_haAwXqivaFf3SYhJ1W_nJkDDz4KhP1dLat2weBaun8pRDfPsKZZRHk&amp;amp;csui=3" target="_blank" rel="noopener"&gt;Veracode&lt;/A&gt;:&lt;/SPAN&gt; Provides a unified AppSec platform with both PTaaS and AI-powered remediation features.&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;8. &lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/search?client=firefox-b-d&amp;amp;cs=1&amp;amp;sca_esv=22ad96beb70fd0c9&amp;amp;sxsrf=AE3TifPu1_IQrvn8OFzTO3DgRP9aaW6yfw%3A1754718885449&amp;amp;q=Astra+Security&amp;amp;sa=X&amp;amp;ved=2ahUKEwj8wcyehf2OAxUTzDgGHXkLGSkQxccNegQILBAB&amp;amp;mstk=AUtExfApB_Ywcb1n9yOpS_tydnzKeid9O_fH6GTpHbGzcLLKyA-s631cfOld5gzxFTbVPjLa_Dd53Sn3i902cr43HQSYCWVXqG6nNdwYeLJ7mqa5zU_e9OKqwYrp_haAwXqivaFf3SYhJ1W_nJkDDz4KhP1dLat2weBaun8pRDfPsKZZRHk&amp;amp;csui=3" target="_blank" rel="noopener"&gt;Astra Security&lt;/A&gt;:&lt;/SPAN&gt; Offers a SaaS platform that combines automated vulnerability scanning with manual penetration testing, focusing on SaaS applications.&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;9. &lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/search?client=firefox-b-d&amp;amp;cs=1&amp;amp;sca_esv=22ad96beb70fd0c9&amp;amp;sxsrf=AE3TifPu1_IQrvn8OFzTO3DgRP9aaW6yfw%3A1754718885449&amp;amp;q=Rapid7&amp;amp;sa=X&amp;amp;ved=2ahUKEwj8wcyehf2OAxUTzDgGHXkLGSkQxccNegQIMRAB&amp;amp;mstk=AUtExfApB_Ywcb1n9yOpS_tydnzKeid9O_fH6GTpHbGzcLLKyA-s631cfOld5gzxFTbVPjLa_Dd53Sn3i902cr43HQSYCWVXqG6nNdwYeLJ7mqa5zU_e9OKqwYrp_haAwXqivaFf3SYhJ1W_nJkDDz4KhP1dLat2weBaun8pRDfPsKZZRHk&amp;amp;csui=3" target="_blank" rel="noopener"&gt;Rapid7&lt;/A&gt;:&lt;/SPAN&gt; Known for its robust automated penetration testing solutions and integration with existing security frameworks.&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;10. &lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/search?client=firefox-b-d&amp;amp;cs=1&amp;amp;sca_esv=22ad96beb70fd0c9&amp;amp;sxsrf=AE3TifPu1_IQrvn8OFzTO3DgRP9aaW6yfw%3A1754718885449&amp;amp;q=Qualysec&amp;amp;sa=X&amp;amp;ved=2ahUKEwj8wcyehf2OAxUTzDgGHXkLGSkQxccNegQINxAB&amp;amp;mstk=AUtExfApB_Ywcb1n9yOpS_tydnzKeid9O_fH6GTpHbGzcLLKyA-s631cfOld5gzxFTbVPjLa_Dd53Sn3i902cr43HQSYCWVXqG6nNdwYeLJ7mqa5zU_e9OKqwYrp_haAwXqivaFf3SYhJ1W_nJkDDz4KhP1dLat2weBaun8pRDfPsKZZRHk&amp;amp;csui=3" target="_blank" rel="noopener"&gt;Qualysec&lt;/A&gt;:&lt;/SPAN&gt; Offers comprehensive security assessments for SaaS applications, combining automated tools with manual testing.&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;When selecting a SaaS penetration testing company, consider factors&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;such as:&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Scope of testing:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN&gt;Does the company offer testing for web applications, mobile apps, APIs, cloud infrastructure, etc.? &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Testing methodology:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN&gt;Do they offer automated scanning, manual penetration testing, or both? &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Integration capabilities:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN&gt;Can their platform integrate with your existing security tools and workflows? &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Reporting and remediation:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN&gt;Do they provide clear, actionable reports and guidance on how to fix vulnerabilities? &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Compliance requirements:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN&gt;Do they have experience with relevant compliance standards for your industry (e.g., PCI DSS, HIPAA, SOC 2)? &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Pricing and scalability:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN&gt;Does the pricing model fit your budget and can they scale with your needs?&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Caute_Cautim&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 09 Aug 2025 06:00:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/82961#M5074</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-08-09T06:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: Reputed Pen Testing Companies to use</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/83011#M5077</link>
      <description>&lt;P&gt;You can also read:&amp;nbsp;&lt;A href="https://qualysec.com/top-20-best-penetration-testing-companies-in-the-uk/" target="_blank"&gt;https://qualysec.com/top-20-best-penetration-testing-companies-in-the-uk/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Aug 2025 04:52:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Reputed-Pen-Testing-Companies-to-use/m-p/83011#M5077</guid>
      <dc:creator>karishmaqualyse</dc:creator>
      <dc:date>2025-08-12T04:52:38Z</dc:date>
    </item>
  </channel>
</rss>

