Category: Mix

Detectify Security Champions tips for positive security culture
26
Apr
2023

Top tips for better security awareness on the job from Detectify Security Champions

Security is not compliance. This is something that the security champions at Detectify can agree on and each employee practices…

TikTok Celebrates One Year of Bug Bounty
26
Apr
2023

TikTok Celebrates One Year of Bug Bounty

For TikTok, a platform that sees more than one billion monthly active users, staying ahead of cyber threats is always…

7 things that your EASM platform should be able to do
26
Apr
2023

7 things that your EASM platform should be able to do

Greetings, digital guardians. Today, we’ll be diving into the wonderful world of External Attack Surface Management (EASM) platforms. As the…

one-medical-amazon
26
Apr
2023

Why I’m OK With Amazon Buying One Medical

Created/Updated: August 7, 2022 A number of security people have come out against Amazon buying One Medical. It’s to be…

Bug Bytes #197 – In the Clouds
26
Apr
2023

Bug Bytes #197 – In the Clouds

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…

 Securing the Supply Chain by Working With Ethical Hackers
26
Apr
2023

 Securing the Supply Chain by Working With Ethical Hackers

At HackerOne’s recent Security@ global cybersecurity conference, three HackerOne experts—CTO and Co-founder Alex Rice, Senior Security Technologist Kayla Underkoffler, and…

Carolin Solskär – Detectify Crowdsource FAQs
26
Apr
2023

Carolin Solskär answers Detectify Crowdsource FAQs

In the summertime, I shared my thoughts on how Detectify Crowdsource is not your average bug bounty program. Through this,…

shower-ideas
26
Apr
2023

Creativity Comes from Idleness – Daniel Miessler

A few years ago I figured out why we’re so creative in the shower Created/Updated: October 26, 2022 Our creativity…

Vulnerability Management | A Complete Guide and Best Practices
26
Apr
2023

Vulnerability Management | A Complete Guide and Best Practices

What is vulnerability management? Vulnerability management is the process of continuously identifying, categorizing, and remediating technology system security vulnerabilities. Vulnerability…

Detectify security updates for December 14
26
Apr
2023

Detectify security updates for December 14

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…

censorship-free-speech
26
Apr
2023

Supporting Sam Harris on Company Autonomy

Created/Updated: August 21, 2022 The internet’s gone a bit crazy about Sam Harris supposedly supporting censorship. As in most cases,…

How Hackers Help Organizations Face New Attack Vectors and Build Stronger Security Programs
26
Apr
2023

How Hackers Help Organizations Face New Attack Vectors and Build Stronger Security Programs

Among the topics they explored included the success of their long-running bug bounty programs in discovering security vulnerabilities, how to…