Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Meet the Hacker: europa: "I always trust my gut when I get the feeling that something is there"

Meet the hacker europa, a white hat hacker on the Detectify Crowdsource platform. He is based in Italy with a great passion for infosec and relatively new to the bug bounty scene, but seasoned in infosec. We asked him about the kind of bugs he likes to find, why he joined Crowdsource and how persistence helped him turn a duplicate finding into a bug with 8 different bypasses.

New Release: ionCube24 App for iOS and Android

We are pleased to announce the release of the ionCube24 app for iOS and Android! With it, you can access ionCube24 wherever you are and monitor your site for performance and security issues. This is a big step forward for ionCube24 giving you ease of access for monitoring your website wherever you are. With notifications and in-app management options you can be aware of issues immediately and act fast. Take a look below to see what the ionCube24 app can do.

5 Cybersecurity Steps You Should Already Be Taking

There’s nothing more impactful than a proactive cybersecurity strategy. What’s your preferred scenario: the one where you’re reeling from a lethal data breach with thousands of customer profiles compromised, or, the one where your team identified and diffused a problem before it had time to wreak havoc?

Security Orchestration Use Case: How to Automate Incident Severity Assignment?

Is your CSIRT team facing too many security alerts? Is your SOC has various security products that are jumbled together? Are you worried about setting the sensitivity of each product? How a severity level should be assigned to each imminent incident? These questions are hard to answer by today’s security professionals. However, security orchestration plays a crucial role in helping experts to address these questions.

How to Conduct a Workplace Investigation

Workplace investigations can be extremely tense and have high stakes. While every investigation will look a little different based on the nature of the company, HR team and incident, it’s important to have a clearly defined plan for investigating reports filed by employees. Here’s a step-by-step guide to conducting a timely, impartial and thorough workplace investigation.

Self-Driving Cars: How Automakers can Overcome Cybersecurity Issues

A lot has been going on with autonomous vehicles these days. Almost every famous car manufacturer seems to be in a rush to master the perfected version of self-driving cars. While most people believe that fully autonomous vehicles are still in their infancy stage, manufacturers think that they will dominate the roads by 2020.