Risto Siilasmaa: “We have to assume that the bad guys will get in”
Risto Siilasmaa is a pioneer in IT security and one of Detectify’s early investors. He is well-known for founding the Finnish IT security company F-Secure…
Risto Siilasmaa is a pioneer in IT security and one of Detectify’s early investors. He is well-known for founding the Finnish IT security company F-Secure…
Hello hackers! Thanks to all of you who participated in our #h1-2006 CTF! We had a lot of fun building it, and it looks like many…
Insufficient Logging and Monitoring is one of the categories on OWASP‘s Top 10 list and covers the lack of best practices that should be in…
Digital transformation has proven that every business is now a software business. In fact, using digital technology to create new business methods, ideas, and experiences…
Update: Broken Access Control is proposed to be number one on the new OWASP Top 10 list of 2021. The group found that 94% of…
Zendesk, Inc. (NYSE: ZEN) is one of the fastest-growing customer support platforms in the world. With over 150,000 customer accounts representing nearly every industry across…
Update: The new OWASP Top 10 of 2021 has been proposed, and the new list has moved XXE into the Security Misconfigurations group and ranks…
Starting this Friday, June 19th will become HackerOne’s annual Day for Action. For Black Americans and communities of color around the globe, Juneteenth is a…
On March 28th, Drupal released a security update that fixes a critical remote code execution vulnerability nicknamed Drupalgeddon 2.0. Detectify scans your site for this…
This guest post is authored by Geoff Norton, Senior Director Software Engineering at PlayStation, and was originally published on PlayStation’s blog. At PlayStation, we are…
Founded in 1827, KTH Royal Institute of Technology in Stockholm is one of Sweden’s leading universities. Niklas Olsson, IT Solution Manager at KTH, and his…
What are Penetration Tests? Penetration testing is one of the most widely used techniques for complying with security regulations and protecting networks, computing systems, and…