Companies’ operating models today are significantly more complex than they were just a couple of years ago, according to BeyondTrust….
(L-R) UTS vice-chancellor and president Professor Andrew Parfitt, Victor Dominello and UNSW Vice-Chancellor and President Professor Attila Brungs. Photo credit:…
As companies compete with how fast new features and products can be released on the digital market, a byproduct of…
Here’s a look at the most interesting products from the past month, featuring releases from: Abnormal Security, Arista Networks, Armorblox,…
Server-side request forgery (or SSRF) vulnerabilities can lead to total system compromise and allow access to an organization’s internal or…
HTTP Response Splitting is a type of attack that occurs when an attacker can manipulate the response headers that will…
According to the New York Times, Microsoft says the state-backed Russian hacker group Nobelium—the same actor behind the 2020 SolarWinds…
Xavier Blasco (a.k.a Lerhan) is a 23-year old security researcher on the Detectify Crowdsource Platform. He’s passionate about security and…
Last week, HackerOne joined WhiteSource, AWS, and IGT for a roundtable discussion about the new security challenges of digital transformation. Both existing organizations…
We have written about Content Security Policy (CSP) on Detectify Labs before. But maybe you’re wondering why should you have…
By Joshua Parsons, Product Marketing Manager at Enzoic For decades, enterprise security measures and employee productivity were seemingly at odds….
Ease of Use, Ease of Integration Encourages Data Protection By Gregory Hoffer, CEO of Coviant Software In 1999 noted cybersecurity…