Category: Mix

Appsec has a need for speed and continuous security
22
Apr
2023

Appsec has a need for speed and continuous security

This is part 2 in a mini-series about the current paradigm shift in security towards a continuous security approach. Richard…

Scott Kuffer of Nucleus Security | SPONSORED INTERVIEW SERIES
22
Apr
2023

Scott Kuffer of Nucleus Security | SPONSORED INTERVIEW SERIES

Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | November 27, 2022…

22
Apr
2023

Understanding Array.prototype.reduce() and recursion using apple pie

An explanation of JavaScript reduce() method and recursive functions using delicious, attention-retaining apples. I was having trouble understanding reduce() and…

How Bug Bounty Uncovered A 5-Year-Old Vulnerability In Hours
22
Apr
2023

How Bug Bounty Uncovered A 5-Year-Old Vulnerability In Hours

When PullRequest was acquired, these concerns became HackerOne’s challenges. When we finalized the acquisition, we immediately added PullRequest’s assets to…

Meet the team: Pedro Merino – in the paint of startup financials
22
Apr
2023

Meet the team: Pedro Merino – in the paint of startup financials

Pedro Merino has brought this value of team work off the court to help the Finance team at Detectify manage…

corporate-fishing-boats-miessler
22
Apr
2023

Companies as Alaskan Fishing Boats

Should we be thinking about corporate workforces as tiny crews dedicated to an extreme life for extreme profit? Created/Updated: November…

22
Apr
2023

Making sandwiches with closures in JavaScript

An explanation of closures and how they can emulate private methods in JavaScript. Say you’re having a little coding get-together,…

DevSecOps vs DevOps: What is the Difference?
22
Apr
2023

DevSecOps vs DevOps: What is the Difference?

In this article, we’ll explain what DevSecOps is, how it differs from DevOps, and what security controls it should ideally…

The Buyer's Guide to Scalable Application Security
22
Apr
2023

The Buyer’s Guide to Scalable Application Security

Detectify is helping tech organizations bring safer web products to market by providing crowdsourced, cloud-based, continuous web app security. Here’s…

NO. 359 | WhatsLeak, CCTV Ban, Meta Threats
22
Apr
2023

NO. 359 | WhatsLeak, CCTV Ban, Meta Threats

Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | November 28, 2022…

22
Apr
2023

How to code a satellite algorithm and cook paella from scratch

A guide to expertly tackling seemingly complicated problems that you’d rather never tackle in the first place. What if I…

HackerOne’s In-Depth Approach to Vulnerability Triage and Validation
22
Apr
2023

HackerOne’s In-Depth Approach to Vulnerability Triage and Validation

Like triaging in a hospital emergency room, security issues must be diagnosed and handled by an expert as soon as…