Detectify

Infosec products of the month: March 2025
Here’s a look at the most interesting products from the past month, featuring releases from: 1Kosmos, Alloy, Cloudflare, Cytex, Detectify, GetReal Security, iProov, Keysight …

New infosec products of the week: March 14, 2025
Here’s a look at the most interesting products from the past week, featuring releases from Alloy, Detectify, Pondurance, and SimSpace. SimSpace Stack Optimizer allows …

Detectify Alfred helps security teams collect threat intelligence
Detectify announced Alfred, a system that uses AI to completely autonomously source, prioritize, and generate high-fidelity security tests for the CVEs that are most likely to …

CISOs’ strategies for managing a growing attack surface
In this Help Net Security interview, Rickard Carlsson, CEO at Detectify, discusses the evolution of attack surface management in the context of remote work and digital …

Infosec products of the month: May 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Abnormal Security, Adaptive Shield, Appdome, AuditBoard, Calix, Cranium, CyberArk, …

New infosec products of the week: May 31, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Adaptive Shield, Dashlane, Detectify, and Truecaller. Adaptive Shield unveils …

Detectify platform enhancements address growing attack surface complexity
Detectify announced a new Domains page and major improvements to existing capabilities for setting custom attack surface policies. These updates bring control over attack …

Detectify IP Addresses view enables organizations to uncover unauthorized assets
Detectify announced enhancements to its platform that can significantly help to elevate an organization’s visibility into its attack surface. Many organizations need help …

Black Hat USA 2022 video walkthrough
In this Help Net Security video, we take you inside Black Hat USA 2022 at the Mandalay Bay Convention Center in Las Vegas. The video features the following vendors: Abnormal …
Featured news
Resources
Don't miss
- How to find out if your AI vendor is a security risk
- From likes to leaks: How social media presence impacts corporate security
- Review: The Ultimate Kali Linux Book, Third Edition
- Enzoic AD Lite Password Audit Report
- WhatsApp vulnerability could be used to infect Windows users with malware (CVE-2025-30401)