EU Regulating InfoSec: How Detectify helps achieving NIS 2 and DORA compliance
**Disclaimer: The content of this blog post is for general information purposes only and is not legal advice. We are very passionate about cybersecurity rules and …
We love talking about security and we believe that security knowledge should be easily accessible and fun. This is why we came up with our IT Sec FAQ series! In 10 short Q&A format posts, we explain basic web security concepts combined with tips and comments from our very own security experts.
Facebook is brimming with apps – quizzes, games, corporate sweepstakes and much more. What kind of information do you share when you approve apps on Facebook and what are the security implications of allowing them to access your account?
Plugins can add a wide range of fun and useful functions to the popular CMS WordPress, but it is important to keep in mind that most WordPress security breaches happen because of vulnerable plugins. How can you maintain a balance between security and functionality and decide which plugins to install?
It’s extremely risky to use the same password for different user accounts, but remembering multiple passwords is tough! To keep track of all your passwords and stay safe online, you can use a password manager. In this post, we explain how such tools work and give tips on which password managers to choose.
Ever wondered about the advantages of two-factor authentication and whether you should use it? Read this IT Security FAQ snippet to learn more about two-factor authentication and its uses.
You might have heard of white hats, black hats and bug bounties before, but what do these terms really mean? Read on if you want to add these new words to your vocabulary!
Trying to settle on a CMS and not sure what to choose? We explain what you should keep in mind when picking a CMS.
OWASP is often mentioned in web security discussions and in this FAQ post, our expert Johan Edholm explains what OWASP Top 10 is all about and why it’s a great resource for developers.
If you’re curious about SSL and how it works, this post is for you! Learn more about SSL and how you can benefit from activating it on your site.
What is the difference between a firewall, antivirus and other security services like Detectify? Find out here!
Curious to know what malware, phishing, spyware, data mining and DDoS is? Check out the final IT Security FAQ here!
**Disclaimer: The content of this blog post is for general information purposes only and is not legal advice. We are very passionate about cybersecurity rules and …
TLDR: This article details methods and tools (from DNS records and IP addresses to HTTP analysis and HTML content) that practitioners can use to classify …