SchellmanCON is back! Join us for our virtual conference on March 6 & 7, 2025

Contact Us
Services
Services
Crypto and Digital Trust
Crypto and Digital Trust
Schellman Training
Schellman Training
Sustainability Services
Sustainability Services
AI Services
AI Services
About Us
About Us
Leadership Team
Leadership Team
Corporate Social Responsibility
Corporate Social Responsibility
Careers
Careers
Strategic Partnerships
Strategic Partnerships

The Schellman Blog

Stay up to date with the latest compliance news from the Schellman blog.

Blog Feature

Penetration Testing

By: Josh Tomkiel
June 2nd, 2022

Whether you’re considering engaging Schellman for a penetration test of some kind or you’ve already signed a contract with us for such, you’d probably agree that transparency benefits everyone.

Blog Feature

Penetration Testing

By: Cory Rey
February 11th, 2022

Benjamin Franklin once said, “an investment in knowledge always pays the best interest.”

Blog Feature

Cybersecurity Assessments | Penetration Testing

By: Philip Holbrook
February 1st, 2022

These days, Mac-based corporate environments can be likened to the Tooth Cave Spider.

Blog Feature

Cybersecurity Assessments | Penetration Testing

By: Rene Guerra
November 18th, 2021

(And Why I Did It) For those of you who work in web application security, maybe you’re familiar with Burp.

Blog Feature

Penetration Testing

By: Austin Bentley
November 2nd, 2021

Make pen testing easier while delivering a better report to your client. For testers in the application security (AppSec) arena, you know that we examine a lot of different areas, including authentication, authorization, encryption, logging, and so on, making for what’s become a staple in this job—the large lists of technical checks that grow even longer every time new issues are discovered and then added for testing. If you’ve worked in AppSec, you know that these tests can make for quite the effort, depending on the complexity of the app you’re working in.

Blog Feature

Cybersecurity Assessments | Penetration Testing

By: MATT WILGUS
June 17th, 2021

During a penetration test, the Schellman team often works with development teams, administrators, risk and compliance professionals and information security personnel; however, the initial point of contact for a penetration test may be an individual that isn’t any of those. More and more, someone from the product or procurement team may have the responsibility—or shared responsibility—of having a penetration test performed. While these individuals may understand a timeline for a specific task, they likely do not have full visibility into the entire project. Such circumstances, among others, can trigger one of the biggest challenges frequently seen in planning pen tests—timing.

Blog Feature

Cybersecurity Assessments | Penetration Testing

By: Wes Dorman
May 5th, 2021

Overview Offensive Security has released several new courses recently, including Evasion Techniques and Breaching Defenses (PEN-300), which primarily focuses on “penetration tests against mature organizations with an established security function.” After reading that overview on the website, I was excited to take on the challenge and expand my knowledge base in preparation for obtaining the OSEP certification.

{