Search What is Detectify?
×

Best practices

Integrate security into your workflow, use automation, and stay on top of threats.

Bug Bounty and Automation make a formidable pair together

Automation Bug Bounty Crowdsourced security Detectify Crowdsource Workflow
e-commerce security

How to choose the right e-commerce platform

Black Friday e-commerce e-commerce security online shopping

Are you ready for Black Friday? Why retailers should care about web security

CDN Cross origin Integrity attribute Security

CDNs – Minimize damages if the CDN is hacked

CMS security Security WordPress

The danger of disabling automatic updates on WordPress

best practices Phishing Security

How to identify a phishing email

Active Directory best practices Service desk

The service desk as an attack vector

email research SPF spoofing

SPF Record Research

best practices Detectify penetration testing Security Workflow

Web Security Now and Then

data protection GDPR Security Workflow

General Data Protection Regulation: What It Means For Your Business

best practices Detectify Guide Security Services

Security-focused Work Routine in 7 Steps