Category: Mix
Many Facets, One Goal A common trope in cybersecurity is “don’t roll your own auth.” There’s a reason for this: implementing…
One hundred million is an enormous number. Today we celebrate with all our hackers the phenomenal milestone of a hundred…
The merciless killing by police of George Floyd laid bare, once again, the institutionalized racism that plagues the USA. It…
This year, we launched new initiatives designed to bring people together in fun and innovative ways, including playing online games,…
.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; } .bh__table_cell { padding: 5px; background-color: #FFFFFF; } .bh__table_cell p { color:…
We start the new year of 2020 with great prospects. First of all, 2019 turned out to be a massive…
Q: Please introduce yourself. Tell us what you do at REI and why cybersecurity is important to REI. A: I’m…
APIs are the backbone of interconnected applications, enabling organizations to innovate, integrate, and scale rapidly. However, as enterprises continue to…
When a critical vulnerability in the printing system CUPS started raising alarms among security teams, Detectify had already entered war-room…
Integrating AI into SOCs The integration of AI into security operations centers (SOCs) and its impact on the workforce are…
What is HAQL? Back in 2022, we were faced with a challenge: we wanted to build useful, actionable dashboards for…
What Is a Spot Check? A Spot Check is a powerful tool for security teams to do a tightly focused and…