Authored by: PlexTrac Author Posted on: November 18, 2021 PlexTrac Attains SOC 2 Type 2 Certification Boise, Idaho, November 18, 2021 — PlexTrac, the cybersecurity software company on a mission to empower teams to win the right cybersecurity battles, is proud to announce that it has attained SOC 2 Type 2 certification. The certification is the most comprehensive within the Systems and Organization Controls audit process and a core benchmark for PlexTrac. This achievement underscores PlexTrac’s commitment to maintaining the highest of security standards for its systems, products, and employees. All PlexTrac users can feel fully confident that the organization will continuously prioritize the safety of customers’ data. PlexTrac’s mission is fully dependent on assuring the highest standards of security of its own systems. SOC 2 Type 2 compliance is an external validation of this core value. “This achievement marks an important milestone in PlexTrac’s journey as a leader in proactive security management,” said Dan DeCloss, Founder and CEO of PlexTrac. “This certification highlights the importance we place on security as a company, and provides added assurance to our customers and partners.” PlexTrac Founder, CEO, and President Daniel DeCloss PlexTrac Author At PlexTrac, we bring together insights from a diverse range of voices. Our blog features contributions from industry experts, ethical hackers, CTOs, influencers, and PlexTrac team members—all sharing valuable perspectives on cybersecurity, pentesting, and risk management.
Qilin Ransomware Surge: Lessons Learned and the PlexTrac Advantage The buzz around Continuous Threat Exposure Management (CTEM) is everywhere right now, and for good reason. Organizations are realizing that traditional vulnerability management, built around periodic scans and reports, can’t keep up with today’s attack surfaces. READ ARTICLE
5 Signs Your Vulnerability Management Program Isn’t Ready for Continuous Threat Exposure Management (CTEM) The buzz around Continuous Threat Exposure Management (CTEM) is everywhere right now, and for good reason. Organizations are realizing that traditional vulnerability management, built around periodic scans and reports, can’t keep up with today’s attack surfaces. READ ARTICLE
From Findings to Fixes: Bridging the Gap Between Pentests and Vulnerability Management Penetration tests are one of the most valuable tools in a security program but also one of the most under-leveraged. Every year, organizations invest in pentests to identify real-world attack paths, validate defenses, and uncover high-impact vulnerabilities. Yet too often, those insights end up trapped in PDF reports, disconnected from the tools and processes that... READ ARTICLE