How event-driven architectures balance continuous security validation and intrusion
Find out how Hadrian’s event-driven architecture allows for continuous security validation which balances consistent testing with a lack of intrusion.
Read moreVulnerability Management is no longer enough to keep up with the rise of of cloud technology during the pandemic, and ever-expanding digital attack surfaces. Read on to learn more about Attack Surface Management v. Vulnerability Management and how Hadrian approaches Attack Surface Management in a holistic way.
Read moreLockdown policies during the COVID-19 pandemic led to rapidly expanding attack surfaces. The rapid and at times ad-hoc implementation of cloud computing services during the pandemic made it difficult for organizations to keep track of growing assets and properly defend these vulnerabilities.
Read moreDeveloping an employee-led culture can be critical for rapidly growing start-ups seeking a sense of team unity and commitment to productivity. It can also be fun! At our Hadrian Culture Building Day in February, we had a great time debating the merits of having a Chief Humour Officer, and whether we prefer public or private Slack channels. In this article our chief of staff, Sofia Verkhoturova, discusses the process of building a company culture from ground up ⬆️ and why despite the challenges, the benefits are worth it. “The nature of startups is that change happens quickly and frequently [...], therefore a culture that is imposed from the top-down won’t stick, because it may not resonate with changing team dynamics.”
Read moreIn this interview, Pepijn discusses the vulnerabilities he’s coming across most often, why they’re emerging, and how the scale of Hadrian’s hacking ambitions and its event-based framework has led him to think about code in new and exciting ways.
Read moreI think the main shift in my understanding has been realizing that my research and learning can be incorporated into the actual product. It’s exciting to see my work going towards building a differentiated product that can do well in this market.
Read more'A “compromised password” is just too simple a mistake for a company like GoDaddy to make. The hacker who breached GoDaddy probably found a huge dump of usernames and passwords from another data breach. Then they used them against high-authority GoDaddy accounts. Clearly, it worked...
Read more