{"version":"1.0","provider_name":"SAST BLOG","provider_url":"https:\/\/sast-solutions.com\/blog-en","author_name":"securityblog","author_url":"https:\/\/sast-solutions.com\/blog-en\/author\/secruityblog\/","title":"Audit or Penetration testing? Find your vulnerabilities before you get hurt!","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"GnEuyCKaNB\"><a href=\"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/23\/audit-or-penetration-testing\/\">Audit or Penetration testing? Find your vulnerabilities before you get hurt!<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/23\/audit-or-penetration-testing\/embed\/#?secret=GnEuyCKaNB\" width=\"600\" height=\"338\" title=\"&#8220;Audit or Penetration testing? Find your vulnerabilities before you get hurt!&#8221; &#8212; SAST BLOG\" data-secret=\"GnEuyCKaNB\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/sast-solutions.com\/blog-en\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"To answer the question of which Security and Compliance check is right for you, we must first remember that the term \u201cvulnerability\u201d can refer to very different levels of your system landscape and thus refer to a number of attack vectors. So, the first question is \u2013 how sure are you that you know where your vulnerabilities are?","thumbnail_url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/sast-blog_audit-vs-pentest_abb_1804-e1523976433515.png"}