Month: March 2023

Cyber Regulations Can Make Our Nation Safer
While a largely voluntary approach to critical infrastructure cybersecurity has led to some improvements, a general lack of mandatory requirements has too often resulted in inconsistent and insufficient protections against cyber intrusions. Recognizing this, the White House unveiled a National Cyber...

HackerOne Assets Deep Dive: Asset Inventory
What is Asset Inventory? The effectiveness of an ASM initiative is determined by how well the solution records the attack surface and presents the data to the organization. A best-in-class ASM program must include a comprehensive inventory of an organization’s...

Detectify Blog – Here’s how EASM fills gaps missed by AppSec solutions
We recently explored why developers have begun to ship more frequently to production, as well the relationship between more frequent releases and AppSec teams more effectively prioritizing and remediating threats. To further understand how AppSec teams evaluate tooling, we’ve...

Ambassador Spotlight: hipotermia
What made you want to become an ambassador? I applied to the HackerOne ambassadors program as soon as I heard about it. In fact, I was part of the first wave of ambassadors to join! I do bug bounties full-time,...

New e-book: Prioritizing and remediating threats with EASM – Detectify Blog
At Detectify, we proudly maintain an AppSec perspective when it comes to how we handle security. But what does this mean exactly? In short, we think a lot about how both AppSec teams and developers will experience our platform and...

Vulnerabilities page updates: Major improvements to accelerate remediation – Detectify Blog
We’ve redesigned the Vulnerabilities page to reduce cognitive overload We know that most security teams today handle a backlog of thousands of vulnerabilities. We also know that not all of these vulnerabilities pose a significant risk to your organization, whether...

How does EASM differ from CAASM and DRPS? – Detectify Blog
Today’s organizations have a plethora of tools and technologies to protect their systems and assets. While this is certainly a privilege, it can sometimes be tough to keep up with the ever-expanding lists of acronyms and tools out there. Effective...