Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Now possible to group assets, from domains to technologies

Security teams have more data about their attack surfaces than ever before. Today, Detectify continuously monitors over 3 million domains (up from 700k around this time last year). As the attack surface grows, so does that amount of data that security teams have to manage. And security teams are feeling the pinch. We’re excited to announce Groups, a more intuitive approach to grouping assets across your attack surface.

12 Tips for a Cyber Safe Christmas

As Christmas approaches, many of you will be winding down and preparing for the festivities – unfortunately, cyber criminals notoriously take advantage of the holiday season, coercing their way into our digital spaces and cashing in on the season of giving. With this in mind, here are our cloud and security experts 12 top-tips, to ensure that your business and workforce, stay one step ahead of the hackers.

What is EV Code Signing Certificate? How Does It Work?

EV Code Signing is an A-grade software security solution that every organization needs. It’s one of the most advanced and integrity-assuring mechanisms. With its usage, publishers can digitally sign their software and release them in compliance with digital platforms. With the increasing reverse engineering and data breaches, it’s essential to use an EV Code Signing Certificate. However, the first step is to understand the EV Code Signing Certificate. So, let’s get started.

Cybersecurity for seniors this holiday season: all generations are a target

During the holiday season, it is essential to take extra precautions when it comes to cybersecurity. Cybercriminals may be more active than usual, looking for ways to exploit unsuspecting users. Protect yourself and your loved ones, ensure that you and they are up to date with the latest security software, and be mindful of potential scams.

Data Protection is Finally a Barbecue Conversation for Ordinary Australians.

Cyber incidents are becoming increasingly common and disruptive–whether it’s ransomware, data breaches, or leaks. The number of compelling events in the last few months in Australia have shown us the implications for businesses, and their customers, when a breach occurs.

Centralized Log Management for the German IT Security Act 2.0

Governments, businesses, and society depend on reliable, functioning information and communication technology. However, increased severity of ransomware attacks and vulnerabilities in computer chips undermine these infrastructures. Further, as people adopt Internet of Things (IoT) devices, their inherent lack of security and ability to be aggregated into large, malicious bot networks increases these risks.

6 Examples of Discretionary Access Control (DAC)

As the basis of pretty much every consumer system available today, Discretionary Access Control (DAC) is everywhere and used by everyone. The files on your computer, the media and applications on your smartphone, and even your social media content. They all use DAC to manage permissions. That’s in part because DAC is easy to manage and understand. But DAC also has a few glaring issues when it comes to cybersecurity.