Blog

Home / Blog

Attomus Infrastructure - an overview

infrastructure best-practices CISO  

We are often asked what the Attomus architecture looks like and how internally we approach development and client work and what tools we use. Clearly as partners of Netlify, Jetbrains, XCP-ng and Atlassian we tend towards using their products and services as the basis of our infrastructure, “eat your own dogfood” being the internal mantra, but there’s value in explaining the reasoning and how we utliise each to combine into the enterprise landscape that we operate.

Reflections on My Work Experience with Attomus

work-experience semafore  

“I worked with Attomus remotely over a period of three weeks and completed two main tasks for the company both relating to the new app Semafore. Semafore is a highly secure communications service, targeted for the use of enterprises and government agencies who need more security than your average company. One task, which I completed by myself, was to update the Semafore website to make it look sleeker and more dynamic by changing the images on the front page of the website.

How Social Media Changed Cybersecurity

social-media cybersecurity  

The rise of social media has changed the way the internet’s bad actors conduct their operations. Organisations are even more vulnerable due to the plethora of private information that is accessible to those who intend to harm them. (image credit: rawpixel.com) A 2022 survey recorded 39% of businesses in the United Kingdom as cyber-attack victims. Phishing attempts have been marked as the most common form of attacks, with 83% of respondents experiencing these, while more sophisticated attacks such as malware, denial of service or ransomware were also reported.

How To Secure Your Cold Wallets

crypto  

How To Secure Your Cold Wallets From Hackers To keep your cryptocurrency investments secure, you must know how to keep your coins safe. With the ever-growing popularity of cryptocurrencies, cyber security threats have skyrocketed. Hackers are always looking for a weak spot in your system and will do anything they can to find it and take advantage of it. Your cold wallets are among the most vulnerable points on your network, but there are certain techniques that can be used to protect them.

Do you need a DLP Strategy?

dlp ciso data-protection gdpr  

The Importance of DLP Strategies in Business Today, data breaches are all too common and can happen quickly. A hacker might be able to compromise a laptop or workstation with access to customer information or steal data from the cloud server of a third-party vendor. It’s not just your own business that’s at risk either - you could also be subjected to an attack by organised hacking groups looking for their next big payday.

Register if you want to learn about cybersecurity and advanced tech.

You can unsubscribe with one click, and we'll never share your email address.

Topics

ai atlassian banking best-practices blockchain ciso climate-change cloud counter-measures covid19 crime crypto culture customer-success cybersecurity data-management data-protection data-security development dlp employees gdpr governance identity-theft infrastructure insider-threat malware office365 offshoring phishing privacy remote-working risk-management robotics security semafore slack social-media technology trojan-horse work-experience

Featured

AI vs. Web Developers - Collaboration or Competing?

AI vs Web Developers - Collaborative Innovation or Competing Forces in the Future of Web Development? Artificial Intelligence (AI) has come to the for...

Blockchain Technology & the Future of Cybersecurity

Over the past few years, we’ve been hearing more and more about crypto in emerging markets, digital money, blockchain technology, and other financial...