• Product
      • Attack Surface Control
        Automated attack surface management
      • Vendor Risk Management
        Next-Gen Third-Party Risk Assessments
    • Attack Surface Control
    • Vendor Risk Management
  • Customers
  • Resources
      • Blog
        Explore the latest news, features and other interesting content
      • Guides
        Learn more about Attack Surface Management with our guides
      • Breachroom
        A collection of cyber attacks and data breaches from 2018
    • Blog
    • Guides
  • Login
Bjoern Zinssmeister
CEO Templarbit
Popular Post
Startups and Security
Recently I have spent more time discussing and working with startups on their security programs. I noticed there is a stronger interest for this topic and now more than ever young companies are hungry to learn and act on security. Why is that?
We live in a world now where everyone has adopted a state of heightened awareness for cyber security. This shift started at the end of 2013. Target got hacked, exposing some 40 million customer debit and credit card accounts. A turning point that suddenly elevated the topic of security to the board level. Many other high profile data breaches and cyber security incidents have occurred since, making sure those board level discussions...
February 6, 2020
Most Recent
Startups and Security
Templarbit Events in 2020
Introducing Sonar: Instantly evaluate and continuously monitor web assets
Templarbit Fireside Chat during RSA 2019: The Future of AppSec
Templarbit panel on the state of DevSecOps during RSA 2019
All Posts
Security recommendations for hosting on AWS
All state of the art hosting services make the security of their infrastructure a number one priority. Regardless, many of their users still suffer from sensitive data exposure and data breaches. Does that imply that the efforts of the hosting service are insufficient? Surprisingly, it does not! In the majority of cases, data exposure and breaches happen due to a user’s misconfiguration of available security settings. This is possible, because most hosting services such as AWS operate under a policy of shared security...
November 21, 2018
The story of why Chrome and Firefox will soon block sites with certain SSL certificates
September 7, 2018
Announcing Breachroom: A collection of recent cyber attacks and data breaches
August 30, 2018
Top HTTP Security Headers and How to Deploy Them
July 24, 2018
The OWASP Top 10: 2013 vs. 2017
December 14, 2017
Product
  • Asset Monitoring
  • Integrations
  • Request Demo
Resources
  • Blog
  • Guides
  • For Startups
  • Breachroom
Company
  • About Us
  • Careers
  • Customers
  • Press
  • Contact Us
  • © Templarbit Inc.
  • Terms of Use
  • Privacy Policy
  • Security