Authored by: PlexTrac Author Posted on: May 20, 2021 PlexTrac Achieves SOC2 Type 1 Compliance IMMEDIATE RELEASE: Wednesday, May 26, 2021 PlexTrac is proud to announce that as of April 30, 2021, it has reinforced its commitment to the security of its clients and partners by becoming SOC 2 Type 1 compliant. Attention is now focused on working through the steps for becoming Type 2 compliant to further demonstrate the company’s dedication to the stability and security of its systems. Along with existing security protocols, this new certification is representative of PlexTrac’s ongoing efforts to ensure the safety of customers’ data. This dedication to security is critical to fulfilling PlexTrac’s mission of empowering every security professional to focus on the real security work. Founder and CEO Dan DeCloss said, “I’m proud of our team and their tireless efforts not only to provide a product that improves the lives of security professionals but also to ensure PlexTrac itself is held to the highest security standards.” About PlexTrac PlexTrac, Inc. is a fast-growing cybersecurity company driven by a mission to improve the security posture of organizations and security teams of all sizes. The PlexTrac solution is a software platform focused on streamlining the reporting and remediation of cybersecurity risks and aiding efficient collaboration within security teams. Supporting organizations using a purple teaming paradigm, PlexTrac serves as the central communication hub to aggregate all of the components of an organization’s cybersecurity program. PlexTrac Author At PlexTrac, we bring together insights from a diverse range of voices. Our blog features contributions from industry experts, ethical hackers, CTOs, influencers, and PlexTrac team members—all sharing valuable perspectives on cybersecurity, pentesting, and risk management.
Qilin Ransomware Surge: Lessons Learned and the PlexTrac Advantage The buzz around Continuous Threat Exposure Management (CTEM) is everywhere right now, and for good reason. Organizations are realizing that traditional vulnerability management, built around periodic scans and reports, can’t keep up with today’s attack surfaces. READ ARTICLE
5 Signs Your Vulnerability Management Program Isn’t Ready for Continuous Threat Exposure Management (CTEM) The buzz around Continuous Threat Exposure Management (CTEM) is everywhere right now, and for good reason. Organizations are realizing that traditional vulnerability management, built around periodic scans and reports, can’t keep up with today’s attack surfaces. READ ARTICLE
From Findings to Fixes: Bridging the Gap Between Pentests and Vulnerability Management Penetration tests are one of the most valuable tools in a security program but also one of the most under-leveraged. Every year, organizations invest in pentests to identify real-world attack paths, validate defenses, and uncover high-impact vulnerabilities. Yet too often, those insights end up trapped in PDF reports, disconnected from the tools and processes that... READ ARTICLE