Top 10 Cybersecurity Blogs to Follow in 2020
Whether you’re a security professional, looking to pursue a career in this industry, or simply interested in the current security and threat landscape—and its societal, cultural and political impact—cybersecurity blogs are often the best source of information you can find online.
SecurityTrails Engineering Retreat: Bali
With all the growth SecurityTrails has been experiencing this past year, and being a fully remote company, many of us have yet to meet all of our fellow team members. When a company is still in its early stages, we tend to put much of our focus on building and perfecting our products. It might feel like there’s no time for anything other than work, but that’s when it’s time for a company retreat: on this occasion, for the entire engineering team!
Top 5 Talks from the 36th Chaos Communication Congress
With topics ranging from security, hardware and science to ethics, art and culture, the 36th Chaos Communication Congress delivered a lot of outstanding lectures, and we wanted to share our favorite five.
Hacker Hunks and Nerd Punks: 36th Chaos Communication Congress
In the days between Christmas and New Year’s Eve when holiday markets close their stands and put away their decorations, and the smell of mulled wine begins to fade, the vibrant German city of Leipzig becomes a hot spot for tens of thousands of hackers, enthusiasts, artists and like-minded individuals.
SecurityTrails Year in Review 2019
Now’s the time when we can take a thoughtful step back and reminisce about the events that have unfolded over the year. Please join us as we take a look at the many milestones, developments and innovations SecurityTrails has seen during the past twelve months.
Top 10 Hacker Movies of all Time
Hollywood has a knack for influencing public opinion on many different topics. It’s been doing just that for over a century, and hackers have been no exception.
Introducing ASR | The #1 Tool to Reduce your Attack Surface Area
From the very beginning, vulnerabilities, open ports and exposed critical applications have been the most easily detected components of your attack surface area, making them the most easily exploited by malicious actors.
List of All Cybersecurity Conferences to Attend in 2020
Conferences are an important part of any industry: they allow you to meet with your peers in a less formal environment, expand your professional network and stay on top of all the latest trends and concepts in your industry.
New Features at SecurityTrails
Whenever we introduce new features, the most valuable information we rely on is customer feedback. So you asked, and we delivered — today we’re introducing updates to our existing Feeds and API as well as a new Status page.
Domain Security & Solutions, Part 3: Stale DNS Records & Subdomain Takeover Attacks
Since the beginning, the Internet has been powered by servers. Going back a few decades, most companies used bare metal servers. Then came VPS servers, which allowed people to run virtual operating systems in a single dedicated server with different applications, database technologies, and more.