Home / Blog
The shift from on-premises operations to cloud-based alternatives come with strategic benefits and inherent risks. Chief amongst these risks is data breach. Therefore, maintaining data integrity becomes paramount in our digital environment; cloud security a CISO nightmare or saving grace. As the manager or owner of a company, you can expect a cyber security incident to cost your business at least £1,410 per event. This amount increases the larger your company is.cybersecurity covid19
The COVID-19 (Coronavirus) pandemic is spreading globally at an alarming rate, and along with disruption in global health, it is also causing damages to social, economic and political systems all over the world. Nearly the entire world workforce is now working remotely from homes, causing them to heavily rely on digital tools and remote means of communication. This has allowed cyber criminals to capitalize the situation and actively exploit the COVID-19 crisis.atlassian
One of the challenges facing companies using Atlassian products behind the firewall is how to configure them to get the same functionality offered by their Cloud brethren. At Attomus we love Netlify but setting it up to auto-trigger builds from private repositories on Bitbucket Server running behind a proxy and firewall - is not as simple as one would hope! Having gone through the process ourselves, we thought it could be valuable for others to put together a quick step by step guide; in our example we’ve got an NginX server acting as a proxy facing the internet, with bitbucket running on a private server, and we want to both trigger builds automatically when we commit an update to the repository, and to ensure Netlify has visibility of the code in order to actually build our site.cybersecurity culture CISO
We consistently recommend that you build a resilient business where cyber-security a priority. But what does organisational culture have to do with improving cyber-security? As most managers and CISOs know, one of the least static areas of business is cyber security. That’s because more than half of the fraud in the UK is conducted online. Therefore, in light of mounting attacks, it’s important to increase awareness at the company level. Plus, to ensure your cybersecurity policies are effective, you must get buy-in and action from all levels of staff.ciso security
Managing third-party risk is inevitable when you work with vendors, suppliers, contractors, and business partners. And the harrowing thing is that you have no control over their networks or security. On-off or snapshot assessments of third-party risks still leave your business vulnerable as neither your business nor the third-party’s operates in a static environment. As things change in real time, you need real-time intelligence to manage third-party risk in your firm.
Topicsatlassian ciso cloud covid19 crime culture cybersecurity insider-threat malware security
The shift from on-premises operations to cloud-based alternatives come with strategic benefits and inherent risks. Chief amongst these risks is data b...
The COVID-19 (Coronavirus) pandemic is spreading globally at an alarming rate, and along with disruption in global health, it is also causing damages...