Please turn on your JavaScript for this page to function normally.
Hackuity

Hackuity 2.0 improves how teams identify, prioritise, and remediate vulnerabilities
Hackuity launched a Version 2.0 of its next generation platform, featuring major enhancements to bring further support to organisations in prioritising risks. Hackuity’s …

How to cultivate a culture of continuous cybersecurity improvement
Regulatory compliance and cybersecurity improvement are not two sides of the same coin: they are distinct pillars that demand specialized attention. Achieving compliance does …

Attack surface management (ASM) is not limited to the surface
Another year of high-profile cyberattacks, another year of beating the cybersecurity drums. Clearly, we’re missing a few notes. Attack surface management (ASM) is a make or …

Hackuity emerges from stealth and raises €12 millions to improve security posture for organizations
Hackuity, an attack prevention cybersecurity startup, emerged from stealth with a €12 millions funding round led by Sonae IM with participation of previous investor Caisse des …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility