Dedicated to Security

Attomus / Blog

Linking Bitbucket Server to Netlify

One of the challenges facing companies using Atlassian products behind the firewall is how to configure them to get the same functionality offered by their Cloud brethren. At Attomus we love Netlify but setting it up to auto-trigger builds from private repositories on Bitbucket Server running behind a proxy and firewall - is not as simple as one would hope! Having gone through the process ourselves, we thought it could be valuable for others to put together a quick step by step guide; in our example we’ve got an NginX server acting as a proxy facing the internet, with bitbucket running on a private server, and we want to both trigger builds automatically when we commit an update to the repository, and to ensure Netlify has visibility of the code in order to actually build our site.

Read More…

Using Organisational Culture to Improve Cyber Security

We consistently recommend that you build a resilient business where cyber-security a priority. But what does organisational culture have to do with improving cyber-security? As most managers and CISOs know, one of the least static areas of business is cyber security. That’s because more than half of the fraud in the UK is conducted online. Therefore, in light of mounting attacks, it’s important to increase awareness at the company level. Plus, to ensure your cybersecurity policies are effective, you must get buy-in and action from all levels of staff.

Read More…

Managing Third-Party Risk - the Importance of Real-Time Intelligence

Managing third-party risk is inevitable when you work with vendors, suppliers, contractors, and business partners. And the harrowing thing is that you have no control over their networks or security. On-off or snapshot assessments of third-party risks still leave your business vulnerable as neither your business nor the third-party’s operates in a static environment. As things change in real time, you need real-time intelligence to manage third-party risk in your firm.

Read More…

The State of Cyber Crime in the UK

Cyber-crime in the UK is on the rise. And the readiness of most firms to meet these challenges leave much to be desired for many local and regional businesses. In the UK alone, the Cabinet Office has estimated the cost of cyber-crimes on the economy at £27bn. At least an estimated £9.2bn of that is related to just the theft of IP from UK businesses. Companies bear the brunt of these financial losses.

Read More…

Insider Threats: A CISO Nightmare

With insider threats, your biggest assets become your biggest risks. One of today’s most damaging security threat comes from trusted insiders. Insider threats can come from anyone in your organisation, from those with the highest access to your company data to those who you think have no access at all. Your insiders are both employees and third parties. The risk is at all levels. Its no wonder that 25% of all security incidents involve company insiders.

Read More…

Register if you want to learn about cybersecurity and advanced tech.

You can unsubscribe with one click, and we'll never share your email address.

Topics

Featured

AI vs. Web Developers - Collaboration or Competing?

AI vs Web Developers - Collaborative Innovation or Competing Forces in the Future of Web Development? Artificial Intelligence (AI) has come to the for...

Blockchain Technology & the Future of Cybersecurity

Over the past few years, we’ve been hearing more and more about crypto in emerging markets, digital money, blockchain technology, and other financial...