Defendify logo Cybersecurity. Simplified.
  1. Mythbusting: Penetration Testing Requirements for GDPR, HIPAA, and Other Regulations

    An important aspect of any company’s cybersecurity posture is knowing the regulatory and compliance requirements that pertain to your business. Familiarizing yourself with the cybersecurity tools, such as penetration testing, is critical to improving your cybersecurity posture and to staying compliant with industry regulations.

    Read More
  2. What’s Your Testing Frequency?

    As a cybersecurity provider, you know the importance of setting your customers up with top-notch training, services, and technology products to protect against modern threats and improve cybersecurity posture. But it can be tough to know what to evaluate – and when. So just how often should you be testing your customers’ network, systems, and people?

    Read More
  3. The Best Defense is a Good Offense

    Are you ready for the big game? The Super Bowl is a global phenomenon: over a hundred million people tuned in to cheer on their favorite team (or at least watch the ads) last year.While the old adage “the best defense is a good offense” understandably rings true for football, in many ways the same can be said for cybersecurity.

    Read More
  4. Feature: Where does IT fit in the cybersecurity puzzle?

    Having an effective cybersecurity posture requires vision and support from business leaders and often builds out of the natural relationship that runs between cybersecurity and technology. We discuss the topic in our recent article on We’ve included an introduction and summary below, but be sure to read the full article here.

    Read More
  5. Good People Who Do Bad People Things

    The past couple of weeks have been busy for the cybersecurity industry. Many professionals converged on Las Vegas to attend Defcon—one of the biggest hacker conventions on the planet. There is no registration, as many attendees want to stay incognito. Those attending know it can be a dangerous place. So why is there a legal event where hackers get together and are invited to do bad things? Well, it’s actually just the opposite.

    Read More