Brandy KoigiNov 19, 20205 minIs Application security training essential for any organization’s security policy?In an increasingly connected digital world, security is becoming an increasingly unavoidable obstacle to data security.
Brandy KoigiNov 12, 20204 minIs Open Source Secure?The term open source can be found labelled in various hardware and software products throughout the computing landscape. What does the term
Thom BradleyNov 5, 20205 minWhy missing on Continuous Monitoring leads to Data Breaches - Capital One’s Breach ExampleData breaches and misconfiguration, get the latest report and statistics as well as great insight on how to avoid it
Brandy KoigiOct 29, 20204 minSignificance of Application Security in the Business world.The internet age and globalization of operations have seen the adoption of computing infrastructure to better facilitate organizations an...
Thom BradleyOct 22, 20205 minCloud Security & Continuous Compliance Challenges - Risk and ComplianceMany digital companies and enterprises are taking a holistic approach when it comes to managing sensitive workloads on public cloud syste...
Thom BradleyOct 15, 20205 minThe role of Identity Access Management (IAM) in raising Issues that lead to BreachesWith more and more businesses hoping onto cloud systems, there is usually no way of preventing important assets and data if both the end-...
Thom BradleyOct 8, 20205 minWhy Misconfiguration Lead to Breaches - Cloud Security - Risk and Compliance When it comes to cloud security, misconfigurations within security compliance are the biggest threat to the notion of safety that users c...
Francesco CipolloneOct 5, 20203 min Open Source Application Security arsenalBuilding Security Phoenix we had toughts of integrating open source scanners, this is an extensive but not complete list of our thinking
Brandy KoigiSep 4, 20205 minContinuous Monitoring - why is it key to your cloud survival2020 Cloud Security report and statistics on Continuous monitoring why is important
Francesco CipolloneAug 13, 20204 minApplication Security in modern cloud worldApplication security, continouus testing of web application vs pen-testing, what's the difference and why you should consider it
Francesco CipolloneAug 10, 20202 minDIY Cloud SecurityCloud Security is Complex, that's why we created a product that unifies people and tools. But you should try some of those Cloud tools
Francesco CipolloneJun 1, 20205 minInformation Disclosure 101 - Part 1Despite all the warnings, it’s amazing how much personal information people give away every single day without giving the consequences a ...
Francesco CipolloneMay 18, 20204 minIs the architecture practice dead? And if so who killed it? Part 2This is the second part of this article, which I thought was necessary to write to get the industry talking about a very real problem.
Francesco CipolloneApr 20, 20208 minCloud Cybersecurity and the modern applications (part 2)Second part of three articles on cloud security this one focus on the blueprint for cloud security and the firewalls
Francesco CipolloneMar 30, 20203 minCovid-19 Relief ScamWith the new wave of relief released by UK and USA government comes a new wave of spam and scam messages. Few of my contact warned me of ...
Francesco CipolloneMar 26, 20206 minKeynotes - you should start nowWhy should you start speaking? A list of suggestions on public speaking for cybersecurity professionals
Francesco CipolloneMar 23, 20202 minCOVID-19 Spam website collectionList of Domains used for COVID19 Spam
Francesco CipolloneMar 17, 20202 minCOVID-19 - Working SuggestionsCovid-19 and working from remote - tips and advices
Francesco CipolloneOct 24, 20193 minAre fraudsters trying to buy bitcoins with your money?Have you noticed odd activity on your bank accounts? Have you been receiving letters or phone calls for unknown people at your address? D...
Francesco CipolloneOct 18, 20193 min15 easy steps to prevent your identity from being stolen More and more companies are becoming data companies and unfortunately, there is no way of stopping that from happening. But what we can a...