Skip to content

PlexTrac recognized in 2025 Gartner® Magic Quadrant for Exposure Assessment Platforms

Learn more >>

PlexTrac Blog

Read articles covering industry thought leadership, PlexTrac updates, cybersecurity foundations, and much more.

This field is for validation purposes and should be left unchanged.

From Friends Friday to Black Hat Europe: What Security Teams Should Focus on Next

Software supply chain vulnerabilities are becoming one of the most unsettling challenges in modern cybersecurity with increasingly creative attackers. To explore these issues, our founder, Daniel DeCloss, sat down with Jonathan Leitschuh, an open source security researcher known for uncovering high-impact vulnerabilities, advancing responsible disclosure practices, and pushing the industry toward more secure-by-default software.

The Missing Link Between Pentest Findings and Fixes

Why Every Security Program Needs a Mobilization Coordinator Pentests rarely fail because testers miss something critical. In fact, that part usually goes pretty well. The breakdown almost always happens after the report is delivered. Findings sit untouched. Some get half-fixed. Others disappear under the weight of sprint deadlines, operational noise, or the vague hope that…

The Automation Imperative: Why Pentest Delivery Must Catch Up With Continuous Testing

Security feels a lot like Whac-A-Mole these days. Between cloud-native architectures, microservices, APIs, and rapid deployment cycles, cybersecurity threats are constantly popping up and redefining how software is built and delivered. Yet penetration testing, which is a proven method for identifying exploitable weaknesses, remains a point-in-time snapshot.In some cases, annual penetration tests don’t even happen….

Cisco Vulnerability Management (formerly known as Kenna) Is Going Away: PlexTrac Can Help Teams Move Forward

If you’ve been around vulnerability management for a while, you probably saw the news: Cisco is sunsetting Cisco Vulnerability Management (fka Kenna Security). This may come as a surprise to some, but it reflects a broader shift already underway. Risk-based vulnerability management is no longer just about scoring vulnerabilities—it’s about understanding exposure, orchestrating remediation, validating fixes, and continuously aligning teams around what actually matters.

Automate Pentest Findings Delivery in Real-Time

Take the Pain Out of Pentest Delivery With Automation For many security teams, traditional pentest delivery still relies on static PDFs, spreadsheets, and email threads. Findings sit idle while reports are compiled, manually entered into Jira or ServiceNow, and passed between teams. Meanwhile, critical vulnerabilities remain unaddressed. As testing frequency increases and organizations adopt continuous…

Spooky Supply Chains & Researcher Reality: A Conversation with Jonathan Leitschuh

Software supply chain vulnerabilities are becoming one of the most unsettling challenges in modern cybersecurity with increasingly creative attackers. To explore these issues, our founder, Daniel DeCloss, sat down with Jonathan Leitschuh, an open source security researcher known for uncovering high-impact vulnerabilities, advancing responsible disclosure practices, and pushing the industry toward more secure-by-default software.