Improve cybersecurity in your organisation

Latest posts

Compliance training for developers – From security awareness by design

Compliance training for developers – From security awareness by design

Reading Time: 8 minutes Compliance standards are a valuable but mostly misunderstood part of the corporate culture. Like any other certificate, a compliance certificate demonstrates that the entity/business operates according to a commonly accepted standard and signals trust towards third parties. A successful compliance certificate eases regulatory processes, opens new markets, and in general speeds up revenue generation, which is the key metric for businesses.

Python best practices and common issues

Python best practices and common issues

Reading Time: 9 minutes Python is a high-level, flexible programming language that offers some great features. To be as effective as possible, it is important to possess the knowledge to make the most out of coding with Python.

Where the money is: Financial cybersecurity

Where the money is: Financial cybersecurity

Reading Time: 7 minutes Money management moves towards complete automation, and the evolution of cybercrime follows along. The money heist has changed, we all know that. Cyberspace takes more and more of that cake, but the reason behind attacks remains the same: money, in any form.

Network compromised – Cybersecurity in the telecommunications sector

Network compromised – Cybersecurity in the telecommunications sector

Reading Time: 7 minutes Telecommunications is everywhere. Hence, this area is more exposed to external threats than others. It is crucial to ensure a strong line of defense in this industry, so your entire organization has up-to-date protection and is aware of best practices.

Security Champions: Interview with Alexander Antukh, CISO of Glovo

Security Champions: Interview with Alexander Antukh, CISO of Glovo

Reading Time: 7 minutes Security champions represent an essential part of any security programs. They lead their teams on security projects, ensure internal security and help keeping security on the top of your mind. But how exactly they operate in a business? We asked Alexander Antukh, Director of Security at Glovo for professional insights.

How to turn your developers into security champions?

How to turn your developers into security champions?

Reading Time: 9 minutes Security champions play a vital role in establishing and maintaining a security culture in an engineering organization. See how to turn your developers into security champions!

Why do you need a security champions program?

Why do you need a security champions program?

Reading Time: 6 minutes As the company grows the leadership wants to establish a security program to ensure the solid and undisrupted operation of the business. Security at this point is essential, especially when calculating the loss from a halted business, even for a few hours.

Why cybersecurity is important for business

Why cybersecurity is important for business

Reading Time: 5 minutes Cybersecurity is an inherently negative asset. As with any protective measure, the major challenge is to measure the value (or Return on Investment, ROI) of cybersecurity. It is significantly more difficult to make this value apparent to stakeholders: customers, users and decision-makers in the company.

Security and usability: How to find a good balance

Security and usability: How to find a good balance

Reading Time: 8 minutes How would you like the idea of being escorted by armed security staff from the grocery store to your home in order to protect the valuable air fresheners you have just bought? Would you be confused, would you visit the store again?

Secure collaborative infrastructure deployment workflow with Terraform, Vault, and Atlantis

Secure collaborative infrastructure deployment workflow with Terraform, Vault, and Atlantis

Reading Time: 6 minutes In one of our recent posts, we wrote about the difficulties of adopting infrastructure automation in a previously static environment. As experience shows, it’s never easy to get accustomed to a tool when the size of your team excels in numbers. Exploring its strengths, weaknesses, and boundaries, adopting best practices could take weeks.

Is your company ready for a responsible disclosure policy program?

Is your company ready for a responsible disclosure policy program?

Reading Time: 5 minutes A company has to be mature enough to implement a responsible disclosure policy – or at least mature enough to implement its own tailor-made program. Implementing a responsible disclosure policy can show your security consciousness, yet if you do it wrong, the effects can be detrimental.

Insource instead of outsourcing your cybersecurity operations

Insource instead of outsourcing your cybersecurity operations

Reading Time: 5 minutes As the enterprise architecture becomes more and more complex, the task of the Chief Security Information Officer (CISO) becomes overwhelming. CISOs have a tough time finding talented cybersecurity professionals to support their job. In an interesting article in VentureBeat, Nir Donitza and Gal Ringel wrote about the cybersecurity landscape of Israel in 2018, and what it might predict from global cybersecurity. A few of their findings point to some interesting trends.

Keep your company secure and compliant