<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Beatriz Albernaz</title>
    <description>The latest articles on DEV Community by Beatriz Albernaz (@albernaz_).</description>
    <link>https://dev.to/albernaz_</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3906297%2Fedc52091-c2d1-4552-bd52-1588bc0cd308.jpg</url>
      <title>DEV Community: Beatriz Albernaz</title>
      <link>https://dev.to/albernaz_</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/albernaz_"/>
    <language>en</language>
    <item>
      <title>We Built a Pentesting Company Because We Were Tired of Watching Startups Get Burned</title>
      <dc:creator>Beatriz Albernaz</dc:creator>
      <pubDate>Wed, 13 May 2026 13:47:03 +0000</pubDate>
      <link>https://dev.to/albernaz_/we-built-a-pentesting-company-because-we-were-tired-of-watching-startups-get-burned-10jf</link>
      <guid>https://dev.to/albernaz_/we-built-a-pentesting-company-because-we-were-tired-of-watching-startups-get-burned-10jf</guid>
      <description>&lt;p&gt;There was a pattern we kept seeing that genuinely bothered us.&lt;/p&gt;

&lt;p&gt;A startup would get to Series A, or land their first enterprise customer, and suddenly need a pentest report &lt;em&gt;right now&lt;/em&gt;. They'd scramble to find a vendor, get hit with a 4-week scoping call process, a €30k quote, and a PDF that mostly described low-severity findings their scanner already caught.&lt;/p&gt;

&lt;p&gt;They didn't need a €30k PDF. They needed someone to actually look at their auth layer, their API, their trust boundaries and tell them what was actually broken.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;That frustration is what became &lt;a href="https://faultlinesec.com" rel="noopener noreferrer"&gt;Faultline Security&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  The problem we were trying to solve
&lt;/h2&gt;

&lt;p&gt;When we started talking to early-stage founders about security, the same themes kept coming up:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;"We know we need a pentest but have no idea where to start"&lt;/li&gt;
&lt;li&gt;"The quotes we got were either too expensive or too vague"&lt;/li&gt;
&lt;li&gt;"We have a SOC 2 audit in 8 weeks — is that enough time?"&lt;/li&gt;
&lt;li&gt;"Our enterprise prospect is asking for a pentest report and we've never done one"&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;None of these are hard problems, conceptually.&lt;/p&gt;

&lt;p&gt;We get it! Security is almost always the thing that gets pushed to the next sprint, the next quarter, the next funding round. When you're a small team trying to ship and grow, it's genuinely hard to prioritize. But here's what we keep telling founders: starting early isn't harder, it's actually easier. &lt;/p&gt;

&lt;p&gt;When your codebase is smaller, your attack surface is narrower, and your team is close to every decision, building a solid security foundation takes a fraction of the effort it will cost you later. The expensive, painful pentests we kept seeing weren't just a vendor problem, they were the result of years of deferred security work landing all at once. We wanted to help teams get ahead of that.&lt;/p&gt;

&lt;p&gt;We wanted to build something different: fixed pricing, a scoping process that takes 24 hours not 2 weeks, and findings that are actually written for engineers who need to fix them — not auditors who need to check a box.&lt;/p&gt;




&lt;h2&gt;
  
  
  What building this taught us
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Founders don't know what they need until you ask the right questions.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The first version of our intake process asked things like "what environments are in scope?" and got blank stares. We rewrote it to ask "what would hurt the most if a competitor got in?" That changed everything. Suddenly people could actually answer.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The report is the product.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We spent more time rethinking how findings are written than anything else. A finding that says "Cross-Site Scripting detected on &lt;code&gt;/search&lt;/code&gt;" is useless. A finding that shows the exact payload, the session token that was exfiltrated in the proof of concept, and the two-line code fix — &lt;em&gt;that&lt;/em&gt; is a product.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Timelines are the most anxiety-producing part of the whole process.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The question we get asked more than any other is: &lt;em&gt;how long is this actually going to take?&lt;/em&gt; People have compliance deadlines, fundraise timelines, sales deals on the line. They need a real answer, not "it depends."&lt;/p&gt;

&lt;p&gt;We wrote a detailed breakdown of this recently: &lt;strong&gt;&lt;a href="https://faultlinesec.com/blog/how-long-does-a-startup-pentest-take" rel="noopener noreferrer"&gt;How Long Does a Startup Pentest Take?&lt;/a&gt;&lt;/strong&gt; — the short answer is 3 to 10 days of active testing plus 2 days for the report, so most teams have something in hand in under two weeks. But the full picture is more nuanced, and worth reading if you're scoping something with a hard deadline.&lt;/p&gt;




&lt;h2&gt;
  
  
  The parts nobody tells you about starting a security company
&lt;/h2&gt;

&lt;p&gt;Building in security is weird. You're asking people to trust you with access to their most sensitive systems, before they know you well. Trust-building is the entire job before any actual testing happens.&lt;/p&gt;

&lt;p&gt;We also learned that pricing transparency is itself a differentiator. Most pentesting firms won't put a number on their website. Scope varies, complexity varies. But the endless "contact us for pricing" dance adds friction that small teams don't have time for. Showing a real range upfront, even approximate, changes the quality of conversations you have.&lt;/p&gt;

&lt;p&gt;And the writing matters more than we expected. Content like the timeline post above has brought in more qualified leads than any cold outreach we've done. People who are googling "how long does a pentest take" are &lt;em&gt;in the buying process&lt;/em&gt;. Meeting them where they are with an honest, detailed answer builds more trust than any sales email.&lt;/p&gt;




&lt;h2&gt;
  
  
  Where we stand now
&lt;/h2&gt;

&lt;p&gt;Faultline is purpose-built for SaaS companies and startups that are hitting real security milestones — first enterprise customer, SOC 2 audit, Series A. We're not trying to compete with the big firms doing 6-month red team engagements for banks. We're trying to be the best option for a 20-person company that ships fast and needs a pentest that matches their pace.&lt;/p&gt;

&lt;p&gt;If you're building something and wondering whether you need a pentest, when to do it, or how to think about scope we're happy to talk. No sales process. Just people who care about shipping secure software.&lt;/p&gt;

&lt;p&gt;You can also &lt;a href="https://faultlinesec.com/scope" rel="noopener noreferrer"&gt;scope an engagement directly&lt;/a&gt; and get a fixed-price proposal within 24 hours.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;What questions do you have about security at the early stage? Drop them in the comments. we read everything.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>startup</category>
      <category>webdev</category>
      <category>devops</category>
    </item>
    <item>
      <title>What pentest does your startup actually need?</title>
      <dc:creator>Beatriz Albernaz</dc:creator>
      <pubDate>Thu, 30 Apr 2026 15:02:54 +0000</pubDate>
      <link>https://dev.to/albernaz_/what-pentest-does-your-startup-actually-need-13ch</link>
      <guid>https://dev.to/albernaz_/what-pentest-does-your-startup-actually-need-13ch</guid>
      <description>&lt;p&gt;Most startup founders know they should get a pentest. Fewer know what kind, what scope, or what a reasonable price looks like and the industry hasn't made this easy to figure out.&lt;/p&gt;

&lt;p&gt;Pricing is rarely published. Scope conversations happen after you've already given your email to a sales rep. And the word "pentest" gets used to describe everything from a lightweight automated scan to a two-week manual engagement by a team of three.&lt;/p&gt;

&lt;p&gt;This guide gives you a framework to self-assess what you actually need, based on where your company is and what you're building.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The variables that actually determine what you need&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are four factors that map pretty cleanly to pentest scope and cost:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Company stage&lt;/strong&gt;&lt;br&gt;
Pre-seed and seed companies usually need a lighter engagement — enough to surface critical vulnerabilities and satisfy early security questionnaires, but not a full-blown compliance audit. Series A and beyond typically have more surface area, more integrations, and investors or enterprise customers who want to see a proper report.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. What you're building&lt;/strong&gt;&lt;br&gt;
A web app with an authenticated user section is a different scope than an API serving third-party developers, which is different again from infrastructure with cloud components and CI/CD pipelines. Each surface has different attack vectors and different testing methodologies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Compliance requirements&lt;/strong&gt;&lt;br&gt;
SOC 2 Type II, ISO 27001, and PCI DSS all have specific pentest requirements. If you're pursuing any of these, the pentest needs to meet certain criteria — scope, methodology, report format — that go beyond a general security assessment. This is often the trigger that moves a startup from "we should probably do this at some point" to "we need this done in the next 90 days."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Scope&lt;/strong&gt;&lt;br&gt;
This is the one founders underestimate most. Scope drives cost more than anything else. A focused test on your main web application is a very different engagement from one that covers the application, your API, your admin panel, your cloud configuration, and your internal tooling.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The main pentest types and when you need them&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Web application pentest&lt;/strong&gt;&lt;br&gt;
The most common for early-stage SaaS. Tests your application from the perspective of an authenticated user, an unauthenticated attacker, and sometimes a privileged user. Covers OWASP Top 10 and beyond — auth flows, access controls, injection points, business logic flaws.&lt;br&gt;
→ &lt;u&gt;When you need it&lt;/u&gt;: You have a product with user accounts. A customer asked for a pentest report. You're starting a SOC 2 process.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. API pentest&lt;/strong&gt;&lt;br&gt;
Similar to a web application test but focused on your API endpoints. Critical if your API is externally facing or consumed by third-party developers. Auth, rate limiting, data exposure, BOLA/IDOR vulnerabilities.&lt;br&gt;
→ &lt;u&gt;When you need it&lt;/u&gt;: Your API is your product or a significant part of it. You have developer customers. You're building in a regulated space.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Cloud / infrastructure pentest&lt;/strong&gt;&lt;br&gt;
Tests your cloud environment — misconfigurations, overly permissive IAM roles, exposed storage buckets, network segmentation issues. Usually AWS, GCP, or Azure.&lt;br&gt;
→ &lt;u&gt;When you need it&lt;/u&gt;: You've scaled beyond a simple Heroku deploy. You have infrastructure engineers managing cloud resources. ISO 27001 or SOC 2 is on the roadmap.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Combined / full-scope engagement&lt;/strong&gt;&lt;br&gt;
All of the above, sometimes with internal network or social engineering components. More common at Series B+ or when enterprise contracts require it.&lt;br&gt;
→ &lt;u&gt;When you need it&lt;/u&gt;: You're selling to enterprise. Your compliance framework requires broad scope. You've had a security incident and want comprehensive coverage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A quick self-assessment&lt;/strong&gt;&lt;br&gt;
Answer these honestly and you'll have a good starting point:&lt;/p&gt;

&lt;p&gt;-&lt;strong&gt;Stage&lt;/strong&gt;: Are you pre-product-market-fit, or do you have paying customers and scaling infrastructure?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Surface area&lt;/strong&gt;: What are the components you're worried about? Web app only? API too? Cloud infra?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Driver&lt;/strong&gt;: Is this proactive, or is a customer / investor / compliance requirement pushing you to do it now?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Timeline&lt;/strong&gt;: Do you have a deadline (audit, enterprise deal, fundraise)?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Budget range&lt;/strong&gt;: Are you looking for something under €5k, €5–15k, or are you budgeting for a larger engagement?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The combination of these five answers will tell you whether you need a focused lightweight test, a standard web + API engagement, or a more comprehensive scope.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Skip the guesswork&lt;/strong&gt;&lt;br&gt;
We built a &lt;a href="//faultlinesec.com/quiz"&gt;5-question quiz&lt;/a&gt; that maps your answers to a recommended tier and a starting price.&lt;br&gt;
→ Takes under a minute.&lt;/p&gt;


&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
      &lt;div class="c-embed__body flex items-center justify-between"&gt;
        &lt;a href="faultlinesec.com/quiz" rel="noopener noreferrer" class="c-link fw-bold flex items-center"&gt;
          &lt;span class="mr-2"&gt;faultlinesec.com/quiz&lt;/span&gt;
          

        &lt;/a&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


&lt;p&gt;It asks for your work email before showing the result [full transparency on that] and you'll hear from us. But the recommendation is genuine and accurate enough to use as a starting point for any vendor you end up going with, not just us.&lt;/p&gt;

</description>
      <category>security</category>
      <category>startup</category>
      <category>saas</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
