The Role of ISO 27001 Penetration Testing in Risk Management

Building an Information Security Management System (ISMS) without accurate ISO 27001 penetration testing is like building a bank vault and leaving the combination on a sticky note.  You might have all the right policies written down. However, you have no proof those rules actually protect your data. Passing your audit requires more than completing a …

Stork audit by 7ASecurity

7ASecurity shares results of a security audit of Stork (ISC’s admin interface for Kea servers): 7 security-impact findings (2 high) and all fixes verified, plus threat modeling, SLSA review, and an SBOM.

How 7ASecurity Audits Work: Interim Findings, Manual Testing, and Free Fix Verification

A clear, practical walkthrough of the 7ASecurity audit process: threat-model driven scoping, a dedicated communication channel with interim findings, and free fix verification—so issues are fixed, not just reported.

Interview with OWASP Executive Director on Quality Pentests

OWASP Executive Director Andrew van der Stock interviews 7ASecurity CEO Abraham Aranguren on what “quality pentesting” really means: threat-model driven scoping, researcher-led testing, interim findings, and free fix verification.