Category: Mix
It’s soon time for Summer vacation to begin, and we’ve asked our colleagues to share some of their summer learning…
What Is Vulnerability Testing? Vulnerability testing, also known as vulnerability assessment, evaluates an entire system to look for security weaknesses…
A misconfiguration is exactly what it sounds like; something that is wrongly configured. From a security perspective this can be…
Time is not kind to the security of an organization. The longer you wait, the weaker you are. The more…
For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and…
Software Supply Chain Attacks Are On the Rise Because open source component use is widespread in cloud-native application development, software…
The audit process and certification demonstrates the Detectify company wide commitment to information security and data protection. STOCKHOLM — July…
HackerOne CEO, Marten Mikos, kicked us off by talking about the last year in cybersecurity. “New and significant attacks related…
As we are all currently confined to a life at home during the pandemic, it has become more important than…
What Is Vulnerability Remediation? Vulnerability remediation is the process of addressing system security weaknesses. The steps include the following:…
Scope-creeping doesn’t always end up in a 0-day with a CVE assigned, and this was the fortune of Detectify Crowdsource…
Fortunately, for security leaders and their colleagues in IT charged with executing digital transformations, their relationships with executive management are…