Authored by: PlexTrac Author Posted on: May 20, 2021 PlexTrac Achieves SOC2 Type 1 Compliance IMMEDIATE RELEASE: Wednesday, May 26, 2021 PlexTrac is proud to announce that as of April 30, 2021, it has reinforced its commitment to the security of its clients and partners by becoming SOC 2 Type 1 compliant. Attention is now focused on working through the steps for becoming Type 2 compliant to further demonstrate the company’s dedication to the stability and security of its systems. Along with existing security protocols, this new certification is representative of PlexTrac’s ongoing efforts to ensure the safety of customers’ data. This dedication to security is critical to fulfilling PlexTrac’s mission of empowering every security professional to focus on the real security work. Founder and CEO Dan DeCloss said, “I’m proud of our team and their tireless efforts not only to provide a product that improves the lives of security professionals but also to ensure PlexTrac itself is held to the highest security standards.” About PlexTrac PlexTrac, Inc. is a fast-growing cybersecurity company driven by a mission to improve the security posture of organizations and security teams of all sizes. The PlexTrac solution is a software platform focused on streamlining the reporting and remediation of cybersecurity risks and aiding efficient collaboration within security teams. Supporting organizations using a purple teaming paradigm, PlexTrac serves as the central communication hub to aggregate all of the components of an organization’s cybersecurity program. PlexTrac Author At PlexTrac, we bring together insights from a diverse range of voices. Our blog features contributions from industry experts, ethical hackers, CTOs, influencers, and PlexTrac team members—all sharing valuable perspectives on cybersecurity, pentesting, and risk management.
Bridging Red and Blue Teams With Automated Pentest Delivery For decades, security programs have been shaped by a familiar dynamic: red team versus blue team. Red teams think like attackers, probing systems through attack simulation to uncover weaknesses. Blue teams defend, detect, and respond, working to validate vulnerabilities, remediate risk, and keep the business running. In theory, this tension is healthy. In practice, it often creates friction. READ ARTICLE
The Most Popular Penetration Testing Tools in 2026: 30 Products to Support Your Pentesting Efforts This Year Penetration testing is a crucial part of cybersecurity and involves finding and exploiting vulnerabilities in networks, applications, systems, or physical environments before the bad actors can. Penetration testing also plays a key role in continuous threat exposure management. Point-in-time testing is no longer enough, and continuous penetration testing is key to effectively identifying and mitigating... READ ARTICLE
The Operational Gap Between Pentest Reports and Real Remediation Most security teams invest in pentesting with the expectation that it will lead to real risk reduction. Skilled testers identify meaningful attack paths, validate impact, and provide remediation guidance that is technically sound. In most organizations, the quality of the pentest itself is not the problem. The friction starts after the report is delivered. Security... READ ARTICLE