Explore the minds of The NetSPI Agents

Advance your proactive security knowledge by learning from some of the brightest people in cybersecurity. Our executive blog gives perspective on industry trends, while Hack Responsibly dives deep into the latest CVEs and tactical approaches our team takes. Take your pick!

Security Industry Trends

2025 Cybersecurity Trends That Redefine Resilience, Innovation, and Trust

Explore how 2025’s biggest cybersecurity trends—AI-driven attacks, deepfakes, and platformization—are reshaping the security landscape.

Learn More
Attack Surface Management (ASM)

The Attack Surface is Changing – So Should Your Approach

Discover the pitfalls of DIY attack surface management and why NetSPI’s solutions offer superior security and efficiency.

Learn More
Attack Surface Management (ASM)

NetSPI’s Insights from Forrester’s Attack Surface Management Solutions Landscape, Q2 2024

Read NetSPI’s perspective on key takeaways from Forrester’s The Attack Surface Management Solutions Landscape, Q2 2024.

Learn More
Network Pentesting

Hunting SMB Shares, Again! Charts, Graphs, Passwords & LLM Magic for PowerHuntShares 2.0

Learn how to identify, understand, attack, and remediate SMB shares configured with excessive privilege in active directory environments with the help of new charts, graphs, and LLM capabilities.

Learn More
Penetration Testing as a Service (PTaaS)

Why Changing Pentesting Companies Could Be Your Best Move

Explore strategic decisions on changing pentesting companies. Balance risk, compliance, and security goals with an effective pentesting partner.

Learn More
CAASM

Clarifying CAASM vs EASM and Related Security Solutions

Unscramble common cybersecurity acronyms with our guide to CAASM vs EASM and more to enhance attack surface visibility and risk prioritization.

Learn More
Cloud Pentesting

Filling up the DagBag: Privilege Escalation in Google Cloud Composer

Learn how attackers can escalate privileges in Cloud Composer by exploiting the dedicated Cloud Storage Bucket and the risks of default configurations.

Learn More
Security Industry Trends

Bytes, Books, and Blockbusters: The NetSPI Agents’ Top Cybersecurity Fiction Picks

Craving a cybersecurity movie marathon? Get recommendations from The NetSPI Agents on their favorite media to get inspired for ethical hacking.

Learn More
Social Engineering

Social Engineering Stories: One Phish, Two Vish, and Tips for Stronger Defenses

Hear real-world social engineering stories from The NetSPI Agents and tips to enhance your social engineering testing.

Learn More
Mainframe Penetration Testing

Hacking CICS: 7 Ways to Defeat Mainframe Applications

Explore how modern penetration testing tools uncover vulnerabilities in mainframe applications, highlighting the need for methodical techniques and regular testing to protect these critical systems from threats.

Learn More
Breach and Attack Simulation (BAS)

6 Breach and Attack Simulation Use Cases That Enhance Your Cyber Resilience

Learn how security teams are moving beyond security control validation with these six breach and attack simulation use cases.

Learn More
Social Engineering

Ask These 10 Questions to Enhance Your Social Engineering Testing

Be proactive with social engineering testing to enhance defenses against attacks. Use targeted questions to help maximize testing results.

Learn More