Blog
  • Home
  • Login
  • Try It
New feature: Identify and prioritize Known Exploited Vulnerabilities

New feature: Identify and prioritize Known Exploited Vulnerabilities

Announcements • 2 min read
The Cybersecurity Readiness Podcast: Do you see what attackers see? Threat modeling done right

The Cybersecurity Readiness Podcast: Do you see what attackers see? Threat modeling done right

Cybersecurity • 1 min read
Why it’s important to monitor your SSL (Secure Sockets Layer) and TLS certificates

Why it’s important to monitor your SSL (Secure Sockets Layer) and TLS certificates

Risks & Vulnerabilities • 6 min read
5 cybersecurity analysis mistakes that can leave organizations at risk

5 cybersecurity analysis mistakes that can leave organizations at risk

Cybersecurity • 2 min read
What I've learned from conducting 300 web application pentests

What I've learned from conducting 300 web application pentests

Penetration Testing • 2 min read
The importance of strengthening website security with HTTP security headers

The importance of strengthening website security with HTTP security headers

Cybersecurity • 5 min read
Remembering Our Friend and Founder, Tim Dowling

Remembering Our Friend and Founder, Tim Dowling

3 min read
Why you should add penetration testers to your WAF allowlist

Why you should add penetration testers to your WAF allowlist

Penetration Testing • 3 min read
On Web Application Firewalls (WAFs) and Scanning

On Web Application Firewalls (WAFs) and Scanning

Cybersecurity • 2 min read
Why it’s essential to continuously monitor all of the assets on your attack surface

Why it’s essential to continuously monitor all of the assets on your attack surface

Attack Surface Management • 5 min read
3 website security issues you should constantly watch for or risk a data breach

3 website security issues you should constantly watch for or risk a data breach

Risks & Vulnerabilities • 4 min read
How Halo Security can help you identify your organization’s attack surface

How Halo Security can help you identify your organization’s attack surface

Attack Surface Management • 3 min read
What really matters when it comes to pentesting deliverables

What really matters when it comes to pentesting deliverables

Penetration Testing • 4 min read
Integrate Halo Security into your workflow with Zapier

Integrate Halo Security into your workflow with Zapier

Announcements • 1 min read
Introducing Site Scan, a free tool to check the security status of any website

Introducing Site Scan, a free tool to check the security status of any website

Announcements • 1 min read
Understanding the security risks of third-party scripts

Understanding the security risks of third-party scripts

Risks & Vulnerabilities • 6 min read
← Newer Posts Older Posts →
Platform
  • Home
  • Overview
  • Customers
  • Integrations
  • Resources
  • Plans & Pricing
Features
  • Discovery
  • Firewall Scanning
  • Website Scanning
  • Technology Scanning
  • Server Scanning
  • Application Scanning
  • Dark Web Monitoring
  • Compliance Reporting
  • Security Review
Use Cases
  • Attack Surface Inventory
  • External Vulnerability Management
  • Monitor Subsidiary Risk
  • Evaluate Mergers & Acquisitions
  • Assess Security Program Effectiveness
  • Prevent Subdomain Takeovers
  • Achieve PCI Compliance
Solutions
  • Monitor Certificates
  • Monitor Cookies
  • Monitor Headers
  • Monitor Forms
  • Monitor JavaScript
  • Monitor Downloads
Penetration Testing
  • Pentest Overview
  • Scope a Pentest
Pentest Types
  • Web Application
  • Mobile Application
  • API
  • External Network
  • Internal Network
  • Wireless
  • Compliance
  • Social Engineering
  • Red Teaming
Community
  • Docs
  • Support
  • Blog
  • Site Scan
Company
  • About Us
  • News
  • Partner List
  • Become a Partner
  • Terms
  • Privacy
  • Consent Preferences
  • System Status
  • Trust Center
  • Contact
© 2026 Halo Security