Pentiq

Insights

Security insights and practical perspective

13 articles
Vulnerability Management

How the CISA KEV catalogue transforms vulnerability prioritisation, where it fits alongside EPSS and CVSS, and a simple defensible workflow.

14 May 20266 min read
Penetration Testing

Understand the factors that determine how often to schedule penetration tests, including compliance requirements, organisational complexity and change frequency.

28 Apr 20265 min read
Penetration Testing

Learn how external and internal penetration tests differ, what each aims to uncover, and why both are essential to a comprehensive security programme.

10 Apr 20265 min read
Application Security

Why APIs fail differently to web apps, the OWASP API issues that keep surfacing in 2026, and what a credible API security baseline looks like.

1 Apr 20266 min read
Attack Surface Management

How attackers map your internet-facing assets, the entry points they most often exploit, and the small set of changes that meaningfully reduce risk.

23 Mar 20266 min read
Penetration Testing

A practical guide to evaluating penetration test reports — what good reporting contains, what to ignore, and how to judge quality from the first three pages.

12 Mar 20269 min read
Governance & Policy

The UK ransomware payment ban, notification regime and mandatory reporting requirements explained — plus the controls that materially reduce impact.

27 Feb 20267 min read
Identity & Access

Why password complexity rules fail against modern Active Directory attacks, how AD compromise actually unfolds, and the controls that genuinely reduce risk.

19 Feb 20266 min read
Penetration Testing

Why SaaS organisations need focused penetration testing across applications, APIs, cloud platforms, identity systems and multi-tenant architecture.

2 Feb 20266 min read
Penetration Testing

A practical guide to help organisations prepare for penetration testing engagements, including scoping, documentation, rules of engagement and scheduling.

30 Jan 20265 min read
Penetration Testing

An evidence‑based walkthrough of a well‑run penetration test, covering pre‑engagement planning, discovery, exploitation, reporting and retesting.

28 Jan 20266 min read
Penetration Testing

Penetration testing and vulnerability scanning serve different purposes. A clear, practical guide to what each delivers, where each falls short, and how to choose the right mix.

13 Jan 20268 min read