Read the Latest News From NetSPI
Catch up on our favorite headlines. Stay up to date on new solution announcements, partnerships, achievements, and more.
NetSPI Recognized in the 2026 GigaOm Radar Report for Attack Surface Management (ASM)
NetSPI Recognized in the 2026 GigaOm Radar Report for Attack Surface Management (ASM) Minneapolis, MN – March 4, 2026 – NetSPI®, the global leader in modern penetration testing, today announced it has been recognized in the 2026 GigaOm Radar Report for Attack Surface Management (ASM). GigaOm analysts Chris Ray and Whit Walters’ forward-looking report evaluates 32 ASM solutions based on their feature capabilities and nonfunctional requirements that factor into purchase decisions and determine a solution’s material impact on an organization. The recognition validates NetSPI’s continued momentum and fierce investment in platform […]
VM Blog: Five Security Shifts that Will Define 2026
Joe Evangelisto outlines several critical shifts demanding executive attention. As organizations move from open AI experimentation to governed application, leaders must implement safeguards to manage data exposure and ensure system integrity.
DataCenter Knowledge: Defending at Scale – The Importance of People in Data Center Security
As the demand for AI, cloud computing, and digital infrastructure drives rapid data center expansion, the importance of robust security measures has never been greater. In a recent conversation, Dalin highlights why human factors remain central to effective data center security, even in an era of advanced technology.
Security Week: Exploring AI-Assisted Social Engineering Attacks to Help Prepare Leaders for What Lies Ahead in 2026
SecurityWeek interviewed NetSPI’s Director of Social Engineering, Patrick Sayler, for Cyber Insights 2026 exploring AI-assisted social engineering attacks to help prepare leaders for what lies ahead in 2026.
The AI Journal: From Sign-Ins to Silent Breaches: The New Frontline of Cybersecurity in 2026
Giles Inkson explains how cybersecurity threats in 2026 are shifting from forced entry to legitimate-looking access through compromised identities, AI-powered attacks, and the need for continuous security testing.
TechCircle: NetSPI’s CPTO on Why Proactive Security is Fast Becoming the Enterprise Default
TechCircle explores how NetSPI enables proactive security for enterprise companies in a one-on-one interview with its Interim Chief Product and Technology Officer, Sridhar Jayanthi.
TechRound: Expert Predictions for Cybersecurity in 2026
Nick Walker, Regional Director for EMEA at NetSPI, contributed to TechRound’s expert roundup on what to expect in cybersecurity in 2026, arguing that identity will replace networks as the primary battleground.
Emerging Risks: The Big Question: Maturity vs hype. Are companies buying the right cybersecurity for where they really are?
Hear from Nick Walker, Regional Director for EMEA at NetSPI, in Emerging Risks on why many organisations are investing in advanced cybersecurity before they are ready – and how misaligned ambition is creating new risk.
The AI Journal: When your AI Provider Goes Bankrupt: A Hidden Security Risk CISOs Can’t Ignore
As AI adoption accelerates, CISOs face a growing but overlooked risk: what happens when an AI vendor collapses and takes data, models and security with it. Hear from Sam Kirkman, NetSPI Director of Services EMEA in this article.
TechNative: Turning Regulation into Resilience with Pentesting
Sam Kirkman, NetSPI Director of Services for EMEA, writing in TechNative examines how rising regulatory pressure is reshaping the role of penetration testing, turning compliance requirements into a driver of genuine cyber resilience.
BW Security World: NetSPI Bets On AI Security & Global Expansion In 2026
NetSPI’s Sridhar Jayanthi discusses scaling PTaaS and global expansion to combat AI-driven cyber threats in 2026. Read the full article in BW Security World.
Cyber Defense Magazine: From Clips to Clones: Social Media’s Role in the Rise of Voice Fraud
The article shows how employees, often unintentionally, provide attackers with abundant voice data and contextual clues through posts, podcasts, video clips, and online interactions, making impersonation easier than ever.