Month: March 2023

Cyber Regulations Can Make Our Nation Safer

Cyber Regulations Can Make Our Nation Safer

While a largely voluntary approach to critical infrastructure cybersecurity has led to some improvements, a general lack of mandatory requirements has too often resulted in inconsistent and insufficient protections against cyber intrusions. Recognizing this, the White House unveiled a National Cyber...

/ March 29, 2023
HackerOne Assets Deep Dive: Asset Inventory

HackerOne Assets Deep Dive: Asset Inventory

What is Asset Inventory? The effectiveness of an ASM initiative is determined by how well the solution records the attack surface and presents the data to the organization. A best-in-class ASM program must include a comprehensive inventory of an organization’s...

/ March 28, 2023
Detectify Blog - Here's how EASM fills gaps missed by AppSec solutions

Detectify Blog – Here’s how EASM fills gaps missed by AppSec solutions

We recently explored why developers have begun to ship more frequently to production, as well the relationship between more frequent releases and AppSec teams more effectively prioritizing and remediating threats.    To further understand how AppSec teams evaluate tooling, we’ve...

/ March 28, 2023
Ambassador Spotlight: hipotermia

Ambassador Spotlight: hipotermia

What made you want to become an ambassador? I applied to the HackerOne ambassadors program as soon as I heard about it. In fact, I was part of the first wave of ambassadors to join! I do bug bounties full-time,...

/ March 24, 2023

New e-book: Prioritizing and remediating threats with EASM – Detectify Blog

At Detectify, we proudly maintain an AppSec perspective when it comes to how we handle security. But what does this mean exactly? In short, we think a lot about how both AppSec teams and developers will experience our platform and...

/ March 17, 2023
Vulnerabilities page updates: Major improvements to accelerate remediation - Detectify Blog

Vulnerabilities page updates: Major improvements to accelerate remediation – Detectify Blog

We’ve redesigned the Vulnerabilities page to reduce cognitive overload We know that most security teams today handle a backlog of thousands of vulnerabilities. We also know that not all of these vulnerabilities pose a significant risk to your organization, whether...

/ March 16, 2023
How does EASM differ from CAASM and DRPS? - Detectify Blog

How does EASM differ from CAASM and DRPS? – Detectify Blog

Today’s organizations have a plethora of tools and technologies to protect their systems and assets. While this is certainly a privilege, it can sometimes be tough to keep up with the ever-expanding lists of acronyms and tools out there. Effective...

/ March 8, 2023