top of page
Blog and News
Latest:
Search
Brandy Koigi
Nov 19, 20205 min read
Is Application security training essential for any organization’s security policy?
In an increasingly connected digital world, security is becoming an increasingly unavoidable obstacle to data security.
117 views0 comments
Brandy Koigi
Nov 12, 20204 min read
Is Open Source Secure?
The term open source can be found labelled in various hardware and software products throughout the computing landscape. What does the term
24 views0 comments
Thom Bradley
Nov 5, 20205 min read
Why missing on Continuous Monitoring leads to Data Breaches - Capital One’s Breach Example
Data breaches and misconfiguration, get the latest report and statistics as well as great insight on how to avoid it
148 views1 comment
Brandy Koigi
Oct 29, 20204 min read
Significance of Application Security in the Business world.
The internet age and globalization of operations have seen the adoption of computing infrastructure to better facilitate organizations...
42 views0 comments
Thom Bradley
Oct 22, 20205 min read
Cloud Security & Continuous Compliance Challenges - Risk and Compliance
Many digital companies and enterprises are taking a holistic approach when it comes to managing sensitive workloads on public cloud...
82 views0 comments
Thom Bradley
Oct 15, 20205 min read
The role of Identity Access Management (IAM) in raising Issues that lead to Breaches
With more and more businesses hoping onto cloud systems, there is usually no way of preventing important assets and data if both the...
205 views0 comments
Thom Bradley
Oct 8, 20205 min read
Why Misconfiguration Lead to Breaches - Cloud Security - Risk and Compliance
When it comes to cloud security, misconfigurations within security compliance are the biggest threat to the notion of safety that users...
1,202 views1 comment
Francesco Cipollone
Oct 5, 20203 min read
Open Source Application Security arsenal
Building Security Phoenix we had toughts of integrating open source scanners, this is an extensive but not complete list of our thinking
212 views0 comments
Brandy Koigi
Sep 4, 20205 min read
Continuous Monitoring - why is it key to your cloud survival
2020 Cloud Security report and statistics on Continuous monitoring why is important
198 views0 comments
Francesco Cipollone
Aug 13, 20204 min read
Application Security in modern cloud world
Application security, continouus testing of web application vs pen-testing, what's the difference and why you should consider it
38 views0 comments
Francesco Cipollone
Aug 10, 20202 min read
DIY Cloud Security
Cloud Security is Complex, that's why we created a product that unifies people and tools. But you should try some of those Cloud tools
575 views0 comments
Francesco Cipollone
Jun 1, 20205 min read
Information Disclosure 101 - Part 1
Despite all the warnings, it’s amazing how much personal information people give away every single day without giving the consequences a...
29 views0 comments
Francesco Cipollone
May 18, 20204 min read
Is the architecture practice dead? And if so who killed it? Part 2
This is the second part of this article, which I thought was necessary to write to get the industry talking about a very real problem.
29 views0 comments
Francesco Cipollone
Apr 20, 20208 min read
Cloud Cybersecurity and the modern applications (part 2)
Second part of three articles on cloud security
this one focus on the blueprint for cloud security and the firewalls
278 views0 comments
Francesco Cipollone
Mar 30, 20203 min read
Covid-19 Relief Scam
With the new wave of relief released by UK and USA government comes a new wave of spam and scam messages. Few of my contact warned me of...
31 views1 comment
Francesco Cipollone
Mar 26, 20206 min read
Keynotes - you should start now
Why should you start speaking?
A list of suggestions on public speaking for cybersecurity professionals
146 views0 comments
Francesco Cipollone
Mar 23, 20202 min read
COVID-19 Spam website collection
List of Domains used for COVID19 Spam
181 views0 comments
Francesco Cipollone
Mar 17, 20202 min read
COVID-19 - Working Suggestions
Covid-19 and working from remote - tips and advices
43 views0 comments
Francesco Cipollone
Oct 24, 20193 min read
Are fraudsters trying to buy bitcoins with your money?
Have you noticed odd activity on your bank accounts? Have you been receiving letters or phone calls for unknown people at your address?...
41 views0 comments
Francesco Cipollone
Oct 18, 20193 min read
15 easy steps to prevent your identity from being stolen
More and more companies are becoming data companies and unfortunately, there is no way of stopping that from happening. But what we can...
97 views0 comments
GET IN TOUCH
We would love to hear from you!
If you would like to get in touch with us, click on the button below!
bottom of page