Dedicated to Security

Attomus / Blog

The Cybersecurity Paradox: Investing in What Organisations Hope to Never Need

A peculiar tension plays out in boardrooms across every sector: cybersecurity represents one of the most critical investments an organisation can make, yet it delivers none of the excitement that typically drives corporate spending decisions. This paradox has become a defining challenge for modern corporate governance, particularly as cyber threats continue to escalate in sophistication and frequency.

When a company invests in product development, marketing infrastructure or operational technology, stakeholders can point to tangible outcomes — new features customers will value, expanded market reach, or efficiency gains that boost the bottom line. These investments generate enthusiasm amongst executive teams and shareholders alike because they promise growth, competitive advantage, and visible returns. Cybersecurity, by contrast, promises only that things will continue to function as they currently do. There are no new capabilities to demonstrate, no flashy innovations for the next AGM, no features that will delight customers or differentiate the organisation from its competitors.

Read More…

Architecting Software with a Security-First mindset

In today’s digital landscape, where cyber threats evolve at an alarming pace, security can no longer be an afterthought in software development. The traditional approach of building functionality first and adding security controls later has proven inadequate against sophisticated attacks. This blog post explores the latest thinking in security-focused software architecture, offering practical guidance for industry professionals seeking to strengthen their development practices.

The Evolution of Secure Software Architecture

Software architecture has undergone a significant transformation over the past decade. We’ve moved from monolithic applications with perimeter-based security to distributed systems requiring defence-in-depth strategies. This evolution reflects both changing technology landscapes and a growing understanding of threat actors’ capabilities.

Read More…

How Quantum Computing Could Defeat Today's Encryption and What We Should Do to Protect Ourselves

In the ever-evolving landscape of technology, quantum computing stands out as one of the most revolutionary advancements of the 21st century. While it promises to solve complex problems in fields like medicine, materials science, and artificial intelligence, it also poses a significant threat to the cryptographic systems that underpin modern cybersecurity. In this blog post, we’ll explore how quantum computing could defeat today’s encryption methods and what steps we should take today to safeguard our digital future.

Read More…

Beyond the Buzzwords: How New Computing Technologies Are Reshaping AI

When we talk about advances in artificial intelligence, most people think about bigger datasets and more powerful versions of the computers we use today - huge datacentres with unimaginable processing power that give the guise of computer-based intelligence. However, two radically different approaches to computing are opening up new possibilities for how machines process information and thus where the future of true Articifcal Intelligence resides.

pillars showing the three paradigms of computing - traditional, quantum and neuromorphic

Read More…

How a PostgreSQL database could be compromised by an attacker

PostgreSQL, an open-source relational database management system (RDBMS), is widely regarded for its robustness, scalability, and flexibility. However, like any other piece of software, it is not immune to security vulnerabilities. Understanding how a PostgreSQL database could be compromised by a hack is crucial for database administrators and developers to implement effective security measures. This blog post explores the various methods hackers might use to compromise a PostgreSQL database, offering insights into potential vulnerabilities and how to mitigate them.

Read More…

Register if you want to learn about cybersecurity and advanced tech.

You can unsubscribe with one click, and we'll never share your email address.

Topics

Featured

AI vs. Web Developers - Collaboration or Competing?

Artificial Intelligence (AI) has come to the forefront in various sectors, revolutionising how we approach tasks, innovate, and problem-solve. With...

Blockchain Technology & the Future of Cybersecurity

Over the past few years, we’ve been hearing more and more about