top of page

Blog and News
Latest:
Search


Is Application security training essential for any organization’s security policy?
In an increasingly connected digital world, security is becoming an increasingly unavoidable obstacle to data security.

Brandy Koigi
Nov 19, 20205 min read
122 views
0 comments


Is Open Source Secure?
The term open source can be found labelled in various hardware and software products throughout the computing landscape. What does the term

Brandy Koigi
Nov 12, 20204 min read
26 views
0 comments


Why missing on Continuous Monitoring leads to Data Breaches - Capital One’s Breach Example
Data breaches and misconfiguration, get the latest report and statistics as well as great insight on how to avoid it
Thom Bradley
Nov 5, 20205 min read
174 views
1 comment


Significance of Application Security in the Business world.
The internet age and globalization of operations have seen the adoption of computing infrastructure to better facilitate organizations...

Brandy Koigi
Oct 29, 20204 min read
43 views
0 comments


Cloud Security & Continuous Compliance Challenges - Risk and Compliance
Many digital companies and enterprises are taking a holistic approach when it comes to managing sensitive workloads on public cloud...
Thom Bradley
Oct 22, 20205 min read
86 views
0 comments


The role of Identity Access Management (IAM) in raising Issues that lead to Breaches
With more and more businesses hoping onto cloud systems, there is usually no way of preventing important assets and data if both the...
Thom Bradley
Oct 15, 20205 min read
206 views
0 comments


Why Misconfiguration Lead to Breaches - Cloud Security - Risk and Compliance
When it comes to cloud security, misconfigurations within security compliance are the biggest threat to the notion of safety that users...
Thom Bradley
Oct 8, 20205 min read
1,206 views
1 comment


Open Source Application Security arsenal
Building Security Phoenix we had toughts of integrating open source scanners, this is an extensive but not complete list of our thinking

Francesco Cipollone
Oct 5, 20203 min read
213 views
0 comments


Continuous Monitoring - why is it key to your cloud survival
2020 Cloud Security report and statistics on Continuous monitoring why is important

Brandy Koigi
Sep 4, 20205 min read
198 views
0 comments


Application Security in modern cloud world
Application security, continouus testing of web application vs pen-testing, what's the difference and why you should consider it

Francesco Cipollone
Aug 13, 20204 min read
38 views
0 comments


DIY Cloud Security
Cloud Security is Complex, that's why we created a product that unifies people and tools. But you should try some of those Cloud tools

Francesco Cipollone
Aug 10, 20202 min read
578 views
0 comments


Information Disclosure 101 - Part 1
Despite all the warnings, it’s amazing how much personal information people give away every single day without giving the consequences a...
Francesco Cipollone
Jun 1, 20205 min read
29 views
0 comments


Is the architecture practice dead? And if so who killed it? Part 2
This is the second part of this article, which I thought was necessary to write to get the industry talking about a very real problem.
Francesco Cipollone
May 18, 20204 min read
29 views
0 comments
Cloud Cybersecurity and the modern applications (part 2)
Second part of three articles on cloud security
this one focus on the blueprint for cloud security and the firewalls

Francesco Cipollone
Apr 20, 20208 min read
278 views
0 comments


Covid-19 Relief Scam
With the new wave of relief released by UK and USA government comes a new wave of spam and scam messages. Few of my contact warned me of...

Francesco Cipollone
Mar 30, 20203 min read
31 views
1 comment


Keynotes - you should start now
Why should you start speaking?
A list of suggestions on public speaking for cybersecurity professionals

Francesco Cipollone
Mar 26, 20206 min read
146 views
0 comments


COVID-19 Spam website collection
List of Domains used for COVID19 Spam

Francesco Cipollone
Mar 23, 20202 min read
181 views
0 comments


COVID-19 - Working Suggestions
Covid-19 and working from remote - tips and advices

Francesco Cipollone
Mar 17, 20202 min read
44 views
0 comments


Are fraudsters trying to buy bitcoins with your money?
Have you noticed odd activity on your bank accounts? Have you been receiving letters or phone calls for unknown people at your address?...
Francesco Cipollone
Oct 24, 20193 min read
41 views
0 comments


15 easy steps to prevent your identity from being stolen
More and more companies are becoming data companies and unfortunately, there is no way of stopping that from happening. But what we can...
Francesco Cipollone
Oct 18, 20193 min read
97 views
0 comments
GET IN TOUCH
We would love to hear from you!
If you would like to get in touch with us, click on the button below!
bottom of page