Avatao Blog

Cybersecurity best practices, tips, and the latest news discussed by security professionals.
Read on to find the topic that interests you the most!

Featured article

Browse by category

owasp
appsec
avatao blog devsecops
interviews
secure coding
it security

Latest posts

Why is Cloud Data Privacy Important?

Why is Cloud Data Privacy Important?

Reading Time: 9 minutes The cloud data system has numerous advantages as well as many dangers. 80% of companies have had at least one data breach in the past months.

Why you need SOC2 compliance as a third party vendor

Why you need SOC2 compliance as a third party vendor

Reading Time: 7 minutes Companies understand the way you handle data security has a direct impact on their bottom lines. This has led to most companies requiring all vendors to have a special compliance certificate called an SOC2.

Hacktivity 2021 – Our experiences

Hacktivity 2021 – Our experiences

Reading Time: 7 minutes Our team attended Hacktivity, the biggest IT security conference in Central and Eastern Europe – a whole day full of interesting presentations and workshops. Click to see how we liked it!

Best practices to prevent a password breach

Best practices to prevent a password breach

Reading Time: 7 minutes Most employee passwords fail to follow even the simplest anti-theft precautions, such as creating passwords with a minimum of 12 characters. In a recent study of 15.2 billion passwords, only 2.2 billion were found to be unique.

Why cybersecurity is important for business

Why cybersecurity is important for business

Reading Time: 6 minutes Cybersecurity is, by nature, a negative asset. As with any protective measure, one of the biggest challenges is to measure the value (or return on investment, ROI) of cybersecurity. It is even more difficult to get stakeholders – customers, users, and decision-makers – in the company to understand its value.

Security breaches then and now

Security breaches then and now

Reading Time: 10 minutes The increasing threat of security breaches mostly has to do with the increasing amount of information being stored. Although individuals are responsible for most data creation, 80% of all data is stored by enterprises.

Coding vs secure coding: 6 rules to live by

Coding vs secure coding: 6 rules to live by

Reading Time: 7 minutes Security breaches can impact any organisation. Insecure coding practices may result in increased security risk, and put businesses in jeopardy. Click to read our post about 6 secure coding rules to live by!

Test your secure coding skills with Avatao