Blog

At 13 Security, we excel in providing penetration testing and vulnerability management!

Help Center

Connecting your AWS account via Terraform

To connect your AWS account with our platform please download the following Terraform code: 13_security_scan_role.tf provider “aws” {region = “us-west-2”} variable “external_id” {description = “External

Read More
Compliance

SOC 2: The Ultimate Guide

Overview SOC 2 was created by the American Institute of Certified Public Accountants (AICPA), a professional organization for certified public accountants in the United States.

Read More
Compliance

SOC 1 vs SOC 2 vs SOC 3

SOC (Service Organization Control) audit reports are used to assess the security and control of a service provider’s system and the services they provide to

Read More
Pen Testing & VM

Web and API Penetration Testing

Modern web applications continue to be a challenge for organizations to secure as developers build increasingly complex business applications faster than ever. Many organizations are

Read More
shallow focus photography of computer codes
Pen Testing & VM

A Deep Dive into Black Box Penetration Testing

Black box penetration testing is a method where testers evaluate the security of a network or system without any prior knowledge of its internal workings. This method closely simulates a real-world attack, as attackers usually do not have insider information.

Read More

13 Security Blog

Get email alerts when we publish new blog articles!