Category: Mix

Detectify Crowdsource – Not Your Average Bug Bounty Platform
28
Apr
2023

Detectify Crowdsource – Not Your Average Bug Bounty Platform

How does Detectify Crowdsource get the most skilled ethical hackers of the world to come together and have as broad…

Vulnerability Assessment Tools [Top Tools & What They Do]
28
Apr
2023

Vulnerability Assessment Tools [Top Tools & What They Do]

What Is a Vulnerability Assessment? A vulnerability assessment continuously scans networks and applications to identify new and existing security flaws….

Major update to Attack Surface Custom Policies
28
Apr
2023

Major update to Attack Surface Custom Policies

Set rules on technologies discovered on your attack surface AppSec teams often struggle to either validate or scale their security…

How Hacker-Powered Security Can Help Security Teams Become More Data-Driven 
28
Apr
2023

How Hacker-Powered Security Can Help Security Teams Become More Data-Driven 

Challenges for Traditional Security Teams  Traditional security teams are typically reactive. They’re seen as change-resistant, out of sync with development,…

A summer learning list for better security awareness
28
Apr
2023

A summer learning list for better security awareness

It’s soon time for Summer vacation to begin, and we’ve asked our colleagues to share some of their summer learning…

Vulnerability Testing | Best Techniques for Assessing Risks
28
Apr
2023

Vulnerability Testing | Best Techniques for Assessing Risks

What Is Vulnerability Testing? Vulnerability testing, also known as vulnerability assessment, evaluates an entire system to look for security weaknesses…

Common security misconfigurations and remediations
28
Apr
2023

Common security misconfigurations and remediations

A misconfiguration is exactly what it sounds like; something that is wrongly configured. From a security perspective this can be…

Time to Issue Your Own Cyber Executive Order
28
Apr
2023

Time to Issue Your Own Cyber Executive Order

Time is not kind to the security of an organization. The longer you wait, the weaker you are. The more…

Detectify security updates for 13 July
28
Apr
2023

Detectify security updates for 13 July

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and…

The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help
28
Apr
2023

The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help

Software Supply Chain Attacks Are On the Rise  Because open source component use is widespread in cloud-native application development, software…

Detectify achieves ISO 27001 Certification
28
Apr
2023

Detectify achieves ISO 27001 Certification

The audit process and certification demonstrates the Detectify company wide commitment to information security and data protection. STOCKHOLM — July…

How Hackers—the Best Kept Secret in Cybersecurity—Can Help Your Organization Protect its Assets and Improve Security
28
Apr
2023

How Hackers—the Best Kept Secret in Cybersecurity—Can Help Your Organization Protect its Assets and Improve Security

HackerOne CEO, Marten Mikos, kicked us off by talking about the last year in cybersecurity.  “New and significant attacks related…