Blog
  • Home
  • Login
  • Try It
Integrate Halo Security into your workflow with Zapier

Integrate Halo Security into your workflow with Zapier

Announcements • 1 min read
Introducing Site Scan, a free tool to check the security status of any website

Introducing Site Scan, a free tool to check the security status of any website

Announcements • 1 min read
Understanding the security risks of third-party scripts

Understanding the security risks of third-party scripts

Risks & Vulnerabilities • 6 min read
Exploring the risks of subdomain takeovers

Exploring the risks of subdomain takeovers

Risks & Vulnerabilities • 5 min read
Digital skimmers: what they are, how they work, and how to stay protected against them

Digital skimmers: what they are, how they work, and how to stay protected against them

Risks & Vulnerabilities • 4 min read
Why we're moving away from passwords

Why we're moving away from passwords

Announcements • 2 min read
Why external vulnerability scanning is no longer sufficient on its own

Why external vulnerability scanning is no longer sufficient on its own

Attack Surface Management • 7 min read
It’s Turtles All The Way Down

It’s Turtles All The Way Down

Attack Surface Management • External
Best practices for applying Halo Security's security testing and monitoring services to your assets

Best practices for applying Halo Security's security testing and monitoring services to your assets

Attack Surface Management • 3 min read
3 ways undiscovered cloud assets put your organization at risk

3 ways undiscovered cloud assets put your organization at risk

Attack Surface Management • 2 min read
Attack Surface Management 101: Everything you need to know about the latest approach to external security

Attack Surface Management 101: Everything you need to know about the latest approach to external security

Attack Surface Management • 6 min read
Introducing Halo Security

Introducing Halo Security

Announcements • 1 min read
← Newer Posts
Platform
  • Home
  • Overview
  • Customers
  • Resources
  • Plans & Pricing
Services
  • Discovery
  • Firewall Monitoring
  • Website Monitoring
  • Server Scanning
  • Application Scanning
  • Compliance Reporting
  • Human Assessment
  • Penetration Testing
  • Security Review
Use Cases
  • Attack Surface Inventory
  • External Vulnerability Management
  • Monitor Subsidiary Risk
  • Evaluate Mergers & Acquisitions
  • Assess Security Program Effectiveness
  • Prevent Subdomain Takeovers
Solutions
  • Monitor Certificates
  • Monitor Cookies
  • Monitor Headers
  • Monitor Forms
  • Monitor JavaScript
  • Monitor Downloads
Community
  • Support
  • Blog
Company
  • About Us
  • Partner List
  • Become a Partner
  • Terms
  • Privacy
  • Contact
  • Consent Preferences
© 2025 TrustedSite