Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Detectify security updates for 17 June

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security researchers and Crowdsource ethical hacker community. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. This post highlights a few things that we have improved in the last two weeks.

The COVID-19 Pandemic Dominates the Cybersecurity World

Cybersecurity is not a static world. You can say that it is a social system, it affects and is affected by its surrounding environment. For example, back in 2018, it was the GDPR that shook the foundations of security and privacy by making the protection of our personal data a fundamental human right. But that was then. What is shaping today’s cybersecurity? This is the question that the Infosecurity Magazine State of Cybersecurity 2020 report investigates.

What are the Benefits of a Security Risk Assessment?

Being an important part of cyber security practices, security risk assessment protects your organization from intruders, attackers and cyber criminals. In this article, we will discuss what it is and what benefits it offers. A significant portion of our business processes heavily rely on the Internet technologies. That is why cyber security is a very important practice for all organizations. Making up a crucial part of cyber security, security risk assessment is a topic that must not be overlooked.

Cybersecurity for small business supply chain management

Small businesses are significant contributors to the economy. According to the U.S. Small Administration, they generate approximately 44% of the gross domestic product (GDP) in the U.S. However, small to medium enterprises (SMEs) are also frequently more vulnerable to the threats of our contemporary digital landscape.

Cybersecurity Risk Assessment Tools You Can Rely on Year-round

Traditional cybersecurity risk management remediation efforts start with cybersecurity risk assessments and penetration testing. This commonly involved outsourcing to a consultant who would offer the assessment as a standalone service or as part of a larger risk management program. The issue is cyber risk assessments offered by third-parties only provide a point-in-time assessment of your (or your vendor's) security controls, an inaccurate measure of the true level of risk.

How Rust Lets Us Monitor 30k API calls/min

At Bearer, we are a polyglot engineering team. Both in spoken languages and programming languages. Our stack is made up of services written in Node.js, Ruby, Elixir, and a handful of others in addition to all the languages our agent library supports. Like most teams, we balance using the right tool for the job with using the right tool for the time. Recently, we reached a limitation in one of our services that led us to transition that service from Node.js to Rust.

Two-Years Later: The Current State of GDPR & its Impact on Businesses

In April 2016, European legislators passed the General Data Protection Regulation (GDPR) and announced that it would become enforceable in May 2018. With less than 24 months to get their acts together and avoid hefty fines, organizations scrambled to prepare for compliance. Data breaches have unfortunately become the norm over recent years, and the legislation was formed to better regulate and hold these companies accountable for protecting individual privacy rights.