{"id":718,"date":"2018-12-17T09:46:07","date_gmt":"2018-12-17T08:46:07","guid":{"rendered":"http:\/\/65.108.60.219\/?p=718"},"modified":"2018-12-17T09:46:07","modified_gmt":"2018-12-17T08:46:07","slug":"how-to-make-security-testing-more-cost-effective","status":"publish","type":"post","link":"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective","title":{"rendered":"How to make security testing more cost-effective"},"content":{"rendered":"<p>The issue of price is very difficult when it comes to security testing. After all, how to assess its ROI?<\/p>\n<p><!--more--><\/p>\n<p>That\u2019s a huge challenge indeed. Security testing industry taught companies how to make investments, but hasn\u2019t really focused on efficiency of those investments. If you pick your battles smart, you can achieve much better security posture than your competition, so let\u2019s dig into this and see what could be done better, to achieve greater results at the same or even lower cost.<br \/>\nSimply hiring external penetration testers doesn\u2019t cut it anymore. Software engineering processes have changed significantly so using just penetration tests is not effective and basically every company is doing it, so it\u2019s hard to differentiate that way. If you truly want to go an extra mile, if you want to win trust of your customers, you have to put in the work, because your competitors aren\u2019t that much behind. Lots of businesses these days are aware about the need for security investments, but most of them can\u2019t get it right.<\/p>\n<h2>Everything in business should be driven by proper risk analytics<\/h2>\n<p>But to effectively manage risks, you need to know the costs of remediations and all the alternative paths. Only with a wide context you can make a good judgment on your risk profile.<\/p>\n<blockquote><p>Security Assurance is expensive, but <strong>doesn\u2019t need to be THAT expensive.<\/strong><\/p><\/blockquote>\n<p>You have probably heard about things such as penetration testing, vulnerability assessments and bug bounties. These things are all over the place and it\u2019s hard not to hear about them. But it doesn\u2019t mean you should go after these things, before there is a couple of other things that can have higher and long-term ROI for you.<br \/>\nLet\u2019s consider the most common phases of SDLC, which are planning, requirements analysis, design, development, testing, implementation and maintenance. Conventional penetration tests can be performed in the last three ones, namely during testing, implementation and maintenance.<\/p>\n<h2>Security testing done in a smart way<\/h2>\n<p>If you engage in security activities in the internal testing phase(5), you\u2019ve already skipped 4 stages where you could identify flaws and fix them at a lower cost. Many companies actually hire pentesters to test products deployed in production, thus skipping 6 phases of SDLC.<\/p>\n<h4>Across all companies we\u2019ve worked with, we notice following requirements:<\/h4>\n<p>\u2022 they need to have software built fast<br \/>\n\u2022 they need to have software tested and stable<br \/>\n\u2022 they need to have product in front of customers<br \/>\n\u2022 as soon as possible products must be developed<br \/>\n\u2022 even when engineers are tired and distracted.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The issue of price is very difficult when it comes to security testing. After all, how to assess its ROI?<\/p>\n","protected":false},"author":21,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[37],"tags":[],"class_list":["post-718","post","type-post","status-publish","format-standard","hentry","category-guide"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to make security testing more cost-effective - CyberForces<\/title>\n<meta name=\"description\" content=\"Perform security testing activities in a smart way. Do not omit anything and make sure you know your needs. Learn how from our blog!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to make security testing more cost-effective - CyberForces\" \/>\n<meta property=\"og:description\" content=\"Perform security testing activities in a smart way. Do not omit anything and make sure you know your needs. Learn how from our blog!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-17T08:46:07+00:00\" \/>\n<meta name=\"author\" content=\"Monika Talaga\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Monika Talaga\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective\"},\"author\":{\"name\":\"Monika Talaga\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/41e4a0ec86149383004ec55b5166dd13\"},\"headline\":\"How to make security testing more cost-effective\",\"datePublished\":\"2018-12-17T08:46:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective\"},\"wordCount\":439,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"articleSection\":[\"Guide\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective\",\"url\":\"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective\",\"name\":\"How to make security testing more cost-effective - CyberForces\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"datePublished\":\"2018-12-17T08:46:07+00:00\",\"description\":\"Perform security testing activities in a smart way. Do not omit anything and make sure you know your needs. Learn how from our blog!\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to make security testing more cost-effective\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/41e4a0ec86149383004ec55b5166dd13\",\"name\":\"Monika Talaga\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f883dc5c65bcf3164c1cdb9bd5ff269b1c019f1ce8cef98a364ce3da0969228c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f883dc5c65bcf3164c1cdb9bd5ff269b1c019f1ce8cef98a364ce3da0969228c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f883dc5c65bcf3164c1cdb9bd5ff269b1c019f1ce8cef98a364ce3da0969228c?s=96&d=mm&r=g\",\"caption\":\"Monika Talaga\"},\"url\":\"https:\/\/cyberforces.com\/en\/author\/monika\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to make security testing more cost-effective - CyberForces","description":"Perform security testing activities in a smart way. Do not omit anything and make sure you know your needs. Learn how from our blog!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective","og_locale":"en_US","og_type":"article","og_title":"How to make security testing more cost-effective - CyberForces","og_description":"Perform security testing activities in a smart way. Do not omit anything and make sure you know your needs. Learn how from our blog!","og_url":"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_published_time":"2018-12-17T08:46:07+00:00","author":"Monika Talaga","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Monika Talaga","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective#article","isPartOf":{"@id":"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective"},"author":{"name":"Monika Talaga","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/41e4a0ec86149383004ec55b5166dd13"},"headline":"How to make security testing more cost-effective","datePublished":"2018-12-17T08:46:07+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective"},"wordCount":439,"commentCount":0,"publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"articleSection":["Guide"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective","url":"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective","name":"How to make security testing more cost-effective - CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"datePublished":"2018-12-17T08:46:07+00:00","description":"Perform security testing activities in a smart way. Do not omit anything and make sure you know your needs. Learn how from our blog!","breadcrumb":{"@id":"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/en\/how-to-make-security-testing-more-cost-effective#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"How to make security testing more cost-effective"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]},{"@type":"Person","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/41e4a0ec86149383004ec55b5166dd13","name":"Monika Talaga","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f883dc5c65bcf3164c1cdb9bd5ff269b1c019f1ce8cef98a364ce3da0969228c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f883dc5c65bcf3164c1cdb9bd5ff269b1c019f1ce8cef98a364ce3da0969228c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f883dc5c65bcf3164c1cdb9bd5ff269b1c019f1ce8cef98a364ce3da0969228c?s=96&d=mm&r=g","caption":"Monika Talaga"},"url":"https:\/\/cyberforces.com\/en\/author\/monika"}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=718"}],"version-history":[{"count":5,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/718\/revisions"}],"predecessor-version":[{"id":733,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/718\/revisions\/733"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/categories?post=718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/tags?post=718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}