Security Testing

17 posts tagged with “Security Testing”

Security regulations and best practices for fintech in 2024
February 19, 2024 · 5 min read

Read about cybersecurity regulations shaping the fintech and banking landscape and the best practices to remain compliant and protect customer data.

Help us make security testing more transparent!
February 01, 2024 · 2 min read

We launched a survey to collect expert insights that will help us improve the features & functionalities of HackGATE™ — and increase transparency and accountability in security testing.

Cybersecurity 2024: AI threats, data phishing, and regulations
January 23, 2024 · 6 min read

Discover our predictions for 2024's biggest cybersecurity trends and learn how to stay ahead with proactive security strategies.

The UK’s new PSTI Act for IoT devices: how it impacts you & how we can help
January 10, 2024 · 4 min read

Learn about key requirements of the UK’s new PTSI legislation, penalties for non-compliance, and how our managed VDP can help you adhere to the regulations.

Measuring the success of bug bounty programs: outdated vs new methods
November 28, 2023 · 5 min read

Shift from outdated metrics to advanced methods to monitor the success of your Bug Bounty Programs. Learn how HackGATE's insights and control can help.

Increasing confidence in pentests: how to hold providers and testers accountable?
November 27, 2023 · 5 min read

Explore the importance of accountability in penetration testing. Learn how to choose the right provider, set security boundaries, and monitor testing activity.

How to simplify your SOC 2 compliance audit process using HackGATE
November 20, 2023 · 6 min read

Smoother compliance audits using HackGATE. From understanding compliance prerequisites to transparent security testing, documentation, and risk management.

Maximizing efficiency in Bug Bounty Programs with HackGATE
November 19, 2023 · 4 min read

Discover how HackGATE, an industry-first platform for monitoring penetration tests, can bring transparency and accountability to your bug bounty program.

Traditional pentest vs. bug bounty program: the pros, the cons, and how to do it right
October 24, 2023 · 7 min read

Traditional pentest and bug bounty both have their pros and cons — and for efficient security testing, making the right choice is crucial. Read our comparison.

State of Vulnerability Disclosure: Key learnings from our eBook
September 26, 2023 · 7 min read

Discover the key findings from our survey with security professionals, including the value of VDP for all organizations, the benefits of strong cybersecurity practices, and the importance of positive relationships with ethical hackers.

The illusion of automated vulnerability scans: unveiling the risks and limitations
July 18, 2023 · 6 min read

While automated vulnerability scans provide a quick overview, they often leave critical gaps that can expose businesses to potential risks, giving you a false sense of security. Read our blog post on the limitations of automated vulnerability scans and the steps you can take for a holistic security approach.

Introducing HackGATE: the industry’s first managed gateway for security testing
June 29, 2023 · 4 min read

HackGATE, the industry's first managed gateway for monitoring security testing projects, allows organizations to streamline the auditing process, improve transparency, and separate ethical hackers from real-life attacks, empowering them to take control and ensure comprehensive security testing aligned with industry best practices.

3 key factors to consider for Penetration Testing (as a Service)
May 04, 2023 · 7 min read

Learn the key factors to consider when planning Penetration Testing as a Service. Discover how ethical hackers can help organizations comply with regulatory requirements and industry standards while improving customer confidence and trust in their products and services.

thisclosed_#2
January 16, 2023 · 7 min read

PostgreSQL Database Exfiltration through the abuse of PostgREST requests

thisclosed_#1
January 04, 2022 · 4 min read

Full Account Takeover of ANY user via Insecure Direct Object Reference (IDOR) on reset password functionality

BitNinja bug bounty program - after the first week of testing
May 20, 2021 · 2 min read

BitNinja bug bounty program launched on our platform a few days ago, so far more than 100 ethical hackers have joined. Why the ethical hackers like this program? What are the most important factors in building up your bug bounty program?

Launching a bug bounty program from a CISO's perspective
November 18, 2020 · 5 min read

How can I measure the security level of our IT systems? Should I change our pentester company every year? Where should I store the results of pentest reports? Are these questions familiar to you? If so, keep reading.