NIS2 And DORA Readiness: What European Businesses Must Do Before October 2026

Learn what NIS2 and DORA require in 2026, what the first enforcement wave looks like, and how CTDefense helps European businesses stay compliant.
How CT Defense Uses PentX.ai to Deliver Autonomous Penetration Testing

Autonomous pentesting used to be a marketing word. The category is maturing, and platforms like PentX.ai are starting to do something meaningfully different. Here’s how we use it, what it’s good at, and where we still put a human in the loop.
SAP S/4HANA Security Audit

The audited company is a significant commodity enterprise in Asia, originating from a cooperative in a Southeast Asian country and has expanded into an international conglomerate with presences in 18…
Escaping Restricted Virtual Environments

Virtualization technologies like VMware and Hyper-V have become increasingly popular for delivering virtualized servers, apps, and desktops to businesses. These systems help IT administrators to…
Misleading HTTP Status Codes and How I Got My First CVEs

Many things can happen while working on a pentest, and some vulnerabilities might actually become CVEs. What is a CVE? short for Common Vulnerabilities and Exposures , and found in a list of publicly…
How to Protect Your Systems Against Recent Threat Actor’s Activity (Part 1)

There are specific reasons for any attack, includin cyber security attacks. In the past, people thought that targets are picked randomly. Cybersecurity experience helped us understand that today that…
How to Protect Your Systems Against Recent Threat Actor’s Activity (Part 2)

There are specific reasons for any attack, includin cyber security attacks. In the past, people thought that targets are picked randomly. Cybersecurity experience helped us understand that today that…
The Role of Cyber Operations in a Shooting War

Everybody in the cyber security field, whether blue team or red team has asked themselves at least once: How a cyber war would play out either between two nation-states with similar capabilities or…
How to Get Started in Cyber Security

Are you thinking to start a career in cybersecurity as a Pentest Engineer? The thrill of finding risks and vulnerabilities in different systems sounds exciting to you? We put together some resources…
Women in CyberSecurity

Today we are celebrating a beautiful day for all the women everywhere, The International Women’s Day in 2022. We wanted to explore more about being a female and working in Cyber Security, a male…