Blog
  • Home
  • Login
  • Try It
Crucial Tech Podcast: All Things Data Privacy

Crucial Tech Podcast: All Things Data Privacy

Cybersecurity • 1 min read
New feature: Identify and prioritize Known Exploited Vulnerabilities

New feature: Identify and prioritize Known Exploited Vulnerabilities

Announcements • 2 min read
The Cybersecurity Readiness Podcast: Do you see what attackers see? Threat modeling done right

The Cybersecurity Readiness Podcast: Do you see what attackers see? Threat modeling done right

Cybersecurity • 1 min read
Why it’s important to monitor your SSL (Secure Sockets Layer) and TLS certificates

Why it’s important to monitor your SSL (Secure Sockets Layer) and TLS certificates

Risks & Vulnerabilities • 6 min read
5 cybersecurity analysis mistakes that can leave organizations at risk

5 cybersecurity analysis mistakes that can leave organizations at risk

Cybersecurity • 2 min read
What I've learned from conducting 300 web application pentests

What I've learned from conducting 300 web application pentests

Penetration Testing • 2 min read
The importance of strengthening website security with HTTP security headers

The importance of strengthening website security with HTTP security headers

Cybersecurity • 5 min read
Remembering Our Friend and Founder, Tim Dowling

Remembering Our Friend and Founder, Tim Dowling

3 min read
Why you should add penetration testers to your WAF allowlist

Why you should add penetration testers to your WAF allowlist

Penetration Testing • 3 min read
On Web Application Firewalls (WAFs) and Scanning

On Web Application Firewalls (WAFs) and Scanning

Cybersecurity • 2 min read
Why it’s essential to continuously monitor all of the assets on your attack surface

Why it’s essential to continuously monitor all of the assets on your attack surface

Attack Surface Management • 5 min read
3 website security issues you should constantly watch for or risk a data breach

3 website security issues you should constantly watch for or risk a data breach

Risks & Vulnerabilities • 4 min read
How Halo Security can help you identify your organization’s attack surface

How Halo Security can help you identify your organization’s attack surface

Attack Surface Management • 3 min read
What really matters when it comes to pentesting deliverables

What really matters when it comes to pentesting deliverables

Penetration Testing • 4 min read
Integrate Halo Security into your workflow with Zapier

Integrate Halo Security into your workflow with Zapier

Announcements • 1 min read
Introducing Site Scan, a free tool to check the security status of any website

Introducing Site Scan, a free tool to check the security status of any website

Announcements • 1 min read
← Newer Posts Older Posts →
Platform
  • Home
  • Overview
  • Customers
  • Resources
  • Plans & Pricing
Services
  • Discovery
  • Firewall Monitoring
  • Website Monitoring
  • Server Scanning
  • Application Scanning
  • Compliance Reporting
  • Human Assessment
  • Penetration Testing
  • Security Review
Use Cases
  • Attack Surface Inventory
  • External Vulnerability Management
  • Monitor Subsidiary Risk
  • Evaluate Mergers & Acquisitions
  • Assess Security Program Effectiveness
  • Prevent Subdomain Takeovers
Solutions
  • Monitor Certificates
  • Monitor Cookies
  • Monitor Headers
  • Monitor Forms
  • Monitor JavaScript
  • Monitor Downloads
Community
  • Support
  • Blog
Company
  • About Us
  • Partner List
  • Become a Partner
  • Terms
  • Privacy
  • Contact
  • Consent Preferences
© 2025 TrustedSite