BLOG 01-01

Welcome to Ethiack Blog

Here we discuss cybersecurity for technology companies and enterprise businesses.

You’ll find information on best practices, the latest trends, write-ups, and opinion pieces from our team of Ethical Hackers on how to keep your digital infrastructure safe.

ASM Filters-Ethiack
Find the Needle in the Haystack with Advanced Filters for Attack Surface Management

When you have thousands of assets, it can be hard to find the one you want. With our Advanced Filters for Attack Surface Management, we make it easier. 

SOC2-Cover
Why SOC 2 Compliance is Crucial for Tech Startups: A Guide for CTOs

SOC 2 compliance is crucial for tech startups. For CTOs, it’s not just about security— it's about building trust and unlocking growth.

Ethiack-rez0-adviser
Rez0 Joins Ethiack to Advance AI Offensive Security

Bringing more experts to help advance our mission: Meet our advisor Rez0.

C-Days2024-Ethiack
Making Portugal More Cyber Secure at C-DAYS 2024

C-DAYS 2024 was one of the best events we’ve participated in this year. Here’s the recap.

CS-SECFIX
Upgrading from Annual Pentests to Automated Pentests: SECFIX's Story

Secfix helps companies get ISO 27001 and TISAX compliant. Learn more about how our Automated Pentest helps to keep their assets safe.

Ethiack-API-Cover
Extended Capabilities for Ethiack’s API: What’s Changing

Our new API endpoints open more possibilities for your workflows, enabling hackers, customers, and partners to incorporate Ethiack into their custom applications seamlessly.

Artificial Hacker-Idroid
Meet Idroid: Automated Pentesting for Android Apps

Meet Idroid, our new Artificial Hacker for Android Applications. Find out how you can add it to your plan and start testing your systems with it. 

Ethiack-2.14-CICD
Catch Them Early: Integrate Automated Pentesting in your CI/CD Pipeline

Run tests and prevent vulnerabilities from reaching production by integrating our AI Automated Pentesting in your CI/CD Pipeline.

Ethiack-2.14-Beacon
Ethiack Beacon: Easily Test Your Internal Assets

Start testing internal assets with our Beacon. Read more to understand the technology behind it and how you can set it up on your account.

Ethiack-2.14-Overview
Ethiack 2.14: Test Internal Assets, CI/CD, Visualizer, New Reports, and more!

Ethiack 2.14 is here. Learn all about the new features and upgrades in this groundbreaking version and start testing your digital infrastructure.

ENISA-Notes-Cover
The Cybersecurity Union: Notes from ENISA's Cybersecurity Conference

We’re back from the EU’s main conference on cybersecurity, organized by ENISA, on the 17th of April. Here’s what we learned and what’s next.

Ethiack-Pricing-Updates
Updates to Ethiack's Pricing: What You Need to Know

Learn about the upcoming changes regarding our pricing and how you can make the best of our current prices until May 6th.

Cover-Ethiack-Google
Ethiack's Journey with Google for Startups in the Growth Academy: AI for Cybersecurity

Ethiack was the only Portuguese startup chosen to be part of the 2024 edition of the Growth Academy: AI for Cybersecurity organized and supported by Google for Startups. 

ETHIACK-Digital Exposure Analysis Portugal (1)
Digital Exposure Analysis of the 500 Largest Portuguese Companies

Learn more about our non-intrusive report which reveals what Portuguese companies should do to improve their security posture.

Ethiack-WebSummit
Securing Success: Ethiack is The Most Promising Startup at Web Summit 2023

Ethiack won the Most Promising Startup Award in the Web Summit 2023. This was part of Road 2 Web Summit, a joint initiative by Startup Portugal, Galp, and Web Summit.

CS CEGID
From Checklist-based Pentesting to Autonomous Ethical Hacking: What Changed for CEGID

Discover how Ethiack and Autonomous Ethical Hacking helped CEGID in their offer of dozens of software solutions, often in critical sectors dealing with sensitive data.

Ethiack-Portugal Fintech Report 2023
Ethiack Featured in the Portugal Fintech Report 2023

Ethiack is featured in the Portugal Fintech Report 2023 as an Emerging Fintech, along with an insightful article about cybersecurity from our CEO.

Blog Cover NIS2
Everything Financial Institutions Need to Know about the NIS2 Directive

Take a deep dive into how the European Union has ushered in a new era of cybersecurity with the introduction of the NIS2 Directive.

ETHIACK-INVENTÁRIO DE ATIVOS CIBERSEGURANÇA (4)
Regime Jurídico da Segurança do Ciberespaço: Inventário de Ativos

Tudo o que precisa de saber sobre o Inventário de Ativos para Cibersegurança relativo às alterações regulamentares na Lei n.º 46/2018 e o Decreto-Lei n.º 65/2021.

Blog Post - Ethiack Culture
Ethiack Culture: We T.E.S.T when we test

Know more about life at Ethiack and what we follow while finding vulnerabilities and protecting digital progress by staying true to our values. Discover what TEST means and how we apply it to everything we do.

Blog-cover-rez0
How to use AI and Automation for Ethical Hacking and Vulnerability Assessment

AI will enable huge leaps in automation. Discover how cutting-edge AI tools are reshaping cybersecurity.

Blog DORA
Navigating DORA: What Every Financial Institution Needs to Know

DORA, the legislation that aims to ensure that financial institutions are taking the necessary steps to protect themselves and their customers.

Ethiack 2.0 Walkthrough
Full Walkthrough: Ethiack 2.0

Discover all the new features from the Ethiack 2.0 version. Export reports, manage findings, and vulnerabilities, and assess your current exposure risk score. 

CS CRITICAL SOFTWARE
Protecting Critical Software with Machine Ethical Hacking

Critical Software develops software for the most critical industries. Learn more about how our Machine Ethical Hacking helps to keep their assets safe.

CS COMPLIANCEWISE-1
Continuous Security Assurance for ComplianceWise: Adapting to an Ever-Evolving Landscape

Discover how ComplianceWise keeps its cybersecurity a priority. 

Case-study-wallim
Small and Safe: How Wallim Uses Machine Ethical Hacking to Keep Their Applications and User's Data Safe

Wallim combines apparel with technology, learn more about it.

Bug Bounty vs Pentest
Bug Bounty VS Pentesting for SaaS: Which one should you choose?

Learn everything about choosing between Bug Bounty Programs or Pentesting to keep you company ahead of cyber threats.

ISO 27001 Ethiack
We’re now ISO 27001 certified! Here’s what this means for you

Ethiack is now ISO 27001 certified. Read more about our process and how will this allow us to keep innovating in Autonomous Ethical Hacking.

pentesting-no-more
Pentesting no more: Why it's time to move from Pentesting to Ethical Hacking

In an era of intensive risks in the digital realm, organizations should adopt a more straight-to-the-point approach.

united-against-cyber-enemies
Opinion Article | United Against Cyber Enemies

Nowadays it becomes crucial to validate and prioritize vulnerabilities according to the actual risk they pose to organizations so that security teams can focus on the mitigation.

Case Study BaladAPP
Don’t Stop The Party: How BaladAPP Is Keeping Their Users Safe With Autonomous Ethical Hacking

BaladAPP is the leading app in Brazil for event management. Learn more about security prioritization. 

PNI23
Ethiack distinguished as a Leader in Innovation in Portugal

Ethiack won the first edition of the Prémio Nacional de Inovação in the Cybersecurity category due to our Autonomous Ethical Hacking platform.

vulnerabilities-in-saas-cover
Identifying Vulnerabilities in SaaS: The Guide Updated for 2023

In this guide, we explain everything you need to do to protect your SaaS to avoid data leaks, ransomware and keeping your business safe.

expresso-andre-baptista-cover
If you want peace, prepare for cyberwar

This opinion article was written by our CTO André Baptista, and originally published on Expresso. Read the translated piece here.

writeup-git-cve-cover
Git Arbitrary Configuration Injection (CVE-2023-29007)

Read all about the Git Arbitrary Configuration Injection (CVE-2023-29007) found by our experts André and Vitor. 

webinar-supply-chain-cover
Webinar | Cybersecurity in Supply-Chain

Learn about third-party risk, choosing 3rd party SaaS/cloud solutions vs on-premises, MSSPs External security providers and ethical hacking. 

risk-assessment-cover
Risk Assessment: What is it and how to conduct one

This is a crucial step in developing a comprehensive security program and staying ahead of evolving threats. Find out more about risk assessment.

pentest-ethical-hacking-cover
What is a Pentest: How ethical hacking can protect you

Learn about pentesting and how offensive cybersecurity prevents society's digital structures from collapsing.

hello-world-cover
Hello World

In the digital dimension, chaos may emerge if technology is disrupted. We secure technology business through Autonomous Ethical Hacking.