Search What is Detectify?
×

Best practices

Integrate security into your workflow, use automation, and stay on top of threats.

Bug Bounty and Automation make a formidable pair together

Automation Bug Bounty Crowdsourced security Detectify Crowdsource Workflow
CISO early detection insights security defender

Security Defender Insights: “bad actors are using intelligence and automatic tools, we need to surpass those abilities”

ISO 27001 iso-certification security automation

Detectify’s ISO 27001 certification use case and guide for SaaS companies

Stay up-to-date with security insights from our security experts and ethical hackers Time... to subscribe to the Detectify Monthly Round-up
DNS hijack domain security subdomain takeover

DNS Hijacking – Taking Over Top-Level Domains and Subdomains

Crowdsourced security DAST payload-testing

Continuously Hack Yourself because WAF security is not enough

CMS security eCommerce Magento security security awareness web security

How to “winterize” and secure your eCommerce website for the holidays

NGINX security misconfiguration web security

Common Nginx misconfigurations that leave your web server open to attack

Black Hat PDF

How secure is the PDF file?

CISO DevSecOps reduce attack surface security tips

How to reduce your attack surface

File Disclosure security misconfiguration

Common security misconfigurations and remediations

appsec CISO security leaders trends

Web security trends 2020 from 3 security leaders