Search Go hack yourself with Detectify
×

CMS WordPress

How to Improve Your WordPress Security: Plugins and Themes

Bug Bounty Ethical Hacking IT Sec FAQ White hat

IT Security FAQ 5: What is White Hat vs Black Hat hacking? And what is a bug bounty hunter/program?

CMS WordPress

How To Improve Your WordPress Security

Facebook IT Sec FAQ Two-factor authentication

IT Security FAQ 4: Is two-factor authentication really necessary online? How do you activate it?

SQL Injection Vulnerabilities

What is an SQL Injection and how do you fix it?

IT Sec FAQ KeePass Password Managers Password Safe

IT Security FAQ 3: What password-managers are good? Why should you use one?

Stay up-to-date with security insights from our security experts and ethical hackers Subscribe to the Detectify Monthly Round-up newsletter
Detectify Integrations Trello Workflow

[Integration] You can now integrate Detectify with Trello

IT Sec FAQ Plugins WordPress

IT Security FAQ 2: What should you think about when installing a new plugin on WordPress?

Computer Sweden Ethical Hacking Event Frans Rosen IDG Team White hat

Inside the head of a white hat hacker

CIO Sweden CIO Trends Event Team

Top 3 takeaways from CIO Trend 2016