Pen testing, short for “penetration testing,” uses simulated, authorized cybersecurity attacks to determine how susceptible an organization’s information systems are to unauthorized access. Pen testing is a valuable element of vulnerability management, often performed by outside specialists in the process.