The main benefits of CTF competitions

The main benefits of CTF competitions

Reading Time: 7 minutes The importance of CTFs We live in a time of ever increasing cyberattacks. The landscape is constantly changing, and development teams must always be aware of the newest security challenges. In recent years, but particularly during the Covid-19...
Top Cybersecurity Threats in 2021

Top Cybersecurity Threats in 2021

Reading Time: 8 minutes Top cybersecurity threats in 2021 2021 is coming to a close, and it’s time to take stock of the security lessons we’ve all learned this year. This is the only way we can understand the types of security threats we’ll face next...
The Media Markt attack: Dangers of ransomware

The Media Markt attack: Dangers of ransomware

Reading Time: 7 minutes The Media Markt attack: Dangers of ransomware Ábel Maróti (Junior Marketing Manager, Avatao) As the holiday season approaches, both online and offline sales are increasing, putting more and more pressure on retailers. Black Friday is right...
Why is Cloud Data Privacy Important?

Why is Cloud Data Privacy Important?

Reading Time: 9 minutes Why is cloud data privacy important? Technology is an expensive and complicated line item for most businesses. In addition to paying for the hardware, firms must also pay for staffing and integration. Tedious decision-making regarding vendor...
Why you need SOC2 compliance as a third party vendor

Why you need SOC2 compliance as a third party vendor

Reading Time: 7 minutes Why you need SOC2 compliance as a third party vendor Márk Félegyházi (CEO, Avatao) 2021 has brought an epidemic of breached client records, compromised credit card numbers, and deleted proprietary data. Security breaches increased more this...
Secure coding training for ISO 27001 compliance – Avatao

Secure coding training for ISO 27001 compliance – Avatao

Reading Time: 6 minutes Secure coding training for ISO 27001 compliance Information security has become the pillar of a successful IT company, both in service and product companies. Having an information security certificate demonstrates to customers the existence of...