We have written about Content Security Policy (CSP) on Detectify Labs before. But maybe you’re wondering why should you have…
By Joshua Parsons, Product Marketing Manager at Enzoic For decades, enterprise security measures and employee productivity were seemingly at odds….
Ease of Use, Ease of Integration Encourages Data Protection By Gregory Hoffer, CEO of Coviant Software In 1999 noted cybersecurity…
Amazon’s Live Hacking Event with HackerOne At Amazon, ensuring security is essential for earning customers’ trust. As part of Amazon’s ongoing…
There are times where an attacker can hack a system and yet nothing is sent back, and this is classified…
Reducing risk is the fundamental reason organizations invest in cybersecurity. The threat landscape grows and evolves, creating the need for…
This is a guest blog post from Detectify Crowdsource hacker, Gwendal Le Coguic. This is a tutorial on how to…
Secure data destruction and network router disposal go hand in hand when it comes to office network security. However, a…
Five years after the Defense Digital Service (DDS) launched the first-ever U.S. federal government bug bounty Challenge, we’re pleased to…
Swedish west coast native Emelie Andersson moved to the other side of the country 6 years ago to pursue a…
In April of 2021, the Defense Industrial Base Vulnerability Disclosure Program (DIB-VDP) pilot kicked off a twelve-month program to invite…
Good security starts with knowing your web assets. To enable transparency over your tech stack, we have released Asset Inventory,…