03
May
2023

5 API security best practices you must implement

As outside economic pressures continue to shape how organizations think and allocate resources, data security continues to be a high…

Cybersecurity on a budget
03
May
2023

8 ways to create better cybersecurity awareness with a limited budget

Not all cybersecurity budgets are made equal, and for some that means having too many or too few tools. For…

03
May
2023

Tython: Open-source Security as Code framework and SDK

Development teams utilize automation through Infrastructure as Code (IaC) to facilitate rapid and frequent changes to their cloud-native architectures. Security…

03
May
2023

Security in the cloud with more automation

Hopefully, you’ve been working with the Center for Internet Security (CIS) on securing your cloud infrastructure for a while now….

Announcing the HackerOne Brand Ambassadors
03
May
2023

Announcing the HackerOne Brand Ambassadors

HackerOne Brand Ambassadors are leaders who have a passion to bring the community together in their local city or region….

The Evolution of Data Security Solutions
03
May
2023

The Evolution of Data Security Solutions

By Dan Benjamin, Co-Founder and CEO, Approximately of corporate data now lives in the cloud, a number that has doubled…

Detectify security updates for 23 January
03
May
2023

Detectify security updates for 23 January

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings,…

Female Formula 1 Drivers
03
May
2023

Cybersecurity Firm Backs Qubaisi Sisters

With their continued accomplishments in the racing world, Amna Qubaisi and Hamda Qubaisi are all set to drive their family’s…

No. 380 - LLM-Mind-Reading, Automated War, Rusty Sudo, Eliezer Bitterness Theory...
03
May
2023

No. 380 – LLM-Mind-Reading, Automated War, Rusty Sudo, Eliezer Bitterness Theory…

  Happy Conflu week, Well, I got sick (again) from RSA. The swag at these cons continues to decline. Still…

Is it OK to train an AI on your images, without permission?
03
May
2023

Is it OK to train an AI on your images, without permission?

A tool that’s harvesting pictures to train image-generating AIs has caused some measure of chaos among webmasters who’d rather their…

HackerOne Joins AWS Marketplace as Cloud Vulnerabilities Rise
03
May
2023

HackerOne Joins AWS Marketplace as Cloud Vulnerabilities Rise

Addressing security risks at scale is more important than ever. With a global pandemic accelerating digital transformations, organizations are shipping…

How new T-Mobile hack, shows why you should never link T-Mobile number with bank account
02
May
2023

How new T-Mobile hack, shows why you should never link T-Mobile number with bank account

T-Mobile USA has started alerting customers whose personal information and account data may have been exposed as a consequence of…