Discover key principles and tactics for protecting the modern attack surface.
ViewFind out how a leading financial technology company benefited from Halo Security.
ViewNot sure what KEVs are or why they matter? Check out our explainer video to learn more about these important vulnerabilities.
ViewAre you ready for the latest PCI update? Watch our webinar to learn about some of the upcoming changes and how to stay compliant.
ViewTake a look at how we’ve integrated the KEV catalogue in this product tour.
ViewWatch this product tour to see recent improvement to our asset discovery engine.
ViewLearn how to use auto-tags to organize assets using advanced rule sets.
ViewLearn how you can take advantage of HTTP security headers to strengthen your site’s security.
ViewGet cybersecurity expert Dr. Chatterjee’s thoughts on key components that help build strong cybersecurity programs.
ViewLearn about the improvements we've made to the Halo Security platform, specifically around asset discovery, categorization, and issue prioritization.
ViewLearn how to keep your third-party scripts secure.
ViewIn this research report, we analyze the attack surface of over 100 software companies to understand the top risks they face.
ViewLearn how the digital landscape has evolved over time and why "out-of-scope" assets are prime targets for today’s attackers.
ViewLearn what attack surface management is, why it's needed, and how organizations can use its principles to improve the security of their internet-facing assets.
ViewDiscover how threat modeling can be used to help mitigate the risks of third-party attacks.
ViewSee how attackers are leveraging tools to gain deep visibility into their target's attack surface.
ViewGet a firsthand look at how subdomain takeovers happen and learn how to keep your organization protected.
ViewHalo Security’s VP of Security Nick Merritt shares what he’s learned from his many years as a penetration tester.
ViewNew to ASM? Learn what is it and why your organization needs it in this video.
ViewLearn how Halo Security's Script Monitoring works.
ViewSee how you can monitor your certificates with Halo Security.
ViewFind out how security headers can help protect your site's visitors.
ViewWatch a demo of Halo Security's attack surface management platform.
ViewLearn how risk scores work and how you can use them to help keep your perimeter safe.
View