Category: Mix

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
20
May
2023

IT Security FAQ 6: What CMS is the most vulnerable?

A CMS is a Content Management System used to create, manage and organize content on a web sites or web…

Security by the People: Announcing HackerOne’s FedRAMP Authorization
20
May
2023

Oath Bug Bounty Program Update: $1M in payouts and expansion of the program

This blog was written by Oath CISO and Paranoid in Chief Chris Nims and originally published on Oath.com. A little more…

OWASP Top 10 Vulnerabilities Explained
20
May
2023

OWASP Top 10 Vulnerabilities Explained

OWASP is a non-profit organization with the goal of improving the security of software and internet. They have put together…

U.S. Department of Defense VDP Wins Prestigious 2019 DoD Chief Information Officer Award
19
May
2023

Hacker-Powered Security Report 2018, 188 Facts

Another year, another Hacker-Powered Security Report! We pulled out 100 of the report’s top facts—and then added 18 more, since…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
19
May
2023

IT Sec FAQ – Detectify Blog

We love talking about security and we believe that security knowledge should be easily accessible and fun. This is why…

Slack Increases Bounty Minimums For the Next 90 Days
19
May
2023

7 Common Security Pitfalls to Avoid When Migrating to the Cloud

So you want to move to the cloud. It’s okay. You’re not alone. 96 percent of decision makers in one…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
19
May
2023

IT Security FAQ 7: What is OWASP Top 10?

The Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software….

Confessions of European CISOs | HackerOne
19
May
2023

What is a Responsible Disclosure Policy and Why You Need One

Bug bounty programs may capture the majority of headlines in hacker-powered security today, but organizations of all shapes and sizes…

OWASP TOP 10: XXE - Detectify Blog
19
May
2023

OWASP TOP 10: Broken Authentication

Update: Broken Authentication has moved down the list to position #7 because it seems to be less of an issue…

h1-415 CTF Winners Announced! | HackerOne
19
May
2023

H1-702 2018 makes history with over $500K in bounties paid!

In August 2016, a small group of HackerOne staff brought to life the first ever live hacking event in HackerOne’s…

Join a demo session with Detectify
19
May
2023

Join a demo session with Detectify

We will have scheduled Demo sessions this week and we definitely think that you should join. In the 30 minute…

Highlights of New York’s Cybersecurity Regulation 23 NYCRR Part 500
19
May
2023

Highlights of New York’s Cybersecurity Regulation 23 NYCRR Part 500

September 4, 2018 – Eighteen month transitional period ends. Covered Entities are required to be in compliance with the requirements…