Pentiq

Insights

Security insights and practical perspective

13 articles
Application Security

Why APIs fail differently to web apps, the OWASP API issues that keep surfacing in 2026, and what a credible API security baseline looks like.

14 May 20266 min read
Vulnerability Management

Why CVSS base scores create noise, what CVSS 4.0 changes, and how to combine CVSS with KEV and EPSS for defensible vulnerability prioritisation.

14 May 20266 min read
Penetration Testing

A clear comparison of external and internal penetration tests — the different threat models they assess, how each works, and when you need both.

14 May 20267 min read
Penetration Testing

How to determine the right penetration testing frequency for your organisation, based on risk, regulation, change velocity and exposure — with industry benchmarks.

14 May 20267 min read
Penetration Testing

A practical guide to preparing for penetration testing so the engagement produces actionable evidence with minimum disruption and maximum value.

14 May 20267 min read
Penetration Testing

A clear, end-to-end walkthrough of what a properly run penetration test looks like — from scoping and authorisation through reporting and retesting.

14 May 20266 min read
Vulnerability Management

How the CISA KEV catalogue transforms vulnerability prioritisation, where it fits alongside EPSS and CVSS, and a simple defensible workflow.

14 May 20266 min read
Penetration Testing

Why SaaS organisations need focused penetration testing across applications, APIs, cloud platforms, identity systems and multi-tenant architecture.

14 May 20267 min read
Penetration Testing

Penetration testing and vulnerability scanning serve different purposes. A clear, practical guide to what each delivers, where each falls short, and how to choose the right mix.

14 May 20267 min read
Governance & Policy

The UK ransomware payment ban, notification regime and mandatory reporting requirements explained — plus the controls that materially reduce impact.

14 May 20267 min read
Penetration Testing

A practical guide to evaluating penetration test reports — what good reporting contains, what to ignore, and how to judge quality from the first three pages.

14 May 20268 min read
Attack Surface Management

How attackers map your internet-facing assets, the entry points they most often exploit, and the small set of changes that meaningfully reduce risk.

14 May 20266 min read