CISO
Blog / CISO
Attomus Infrastructure - an overview
infrastructure best-practices CISOWe are often asked what the Attomus architecture looks like and how internally we approach development and client work and what tools we use. Clearly as partners of Netlify, Jetbrains, XCP-ng and Atlassian we tend towards using their products and services as the basis of our infrastructure, “eat your own dogfood” being the internal mantra, but there’s value in explaining the reasoning and how we utliise each to combine into the enterprise landscape that we operate.
Do you need a DLP Strategy?
dlp ciso data-protection gdprThe Importance of DLP Strategies in Business Today, data breaches are all too common and can happen quickly. A hacker might be able to compromise a laptop or workstation with access to customer information or steal data from the cloud server of a third-party vendor. It’s not just your own business that’s at risk either - you could also be subjected to an attack by organised hacking groups looking for their next big payday.
Online Hiring in the Cybersecurity Field
employees cisoIn the present day, nearly all companies are digital. And if they’re not fully digital, they are quickly moving in that direction. Whether it be hiring, recruitment, employee management, or day-to-day tasks, most organisations function primarily with an internet connection. Online presence has become a vital element for companies nowadays and not just for gaining a profit. Did you know that 37% of job seekers will move on to another job offer if they can’t find information about the company online?
7 Tips for Better Mobile Application Security
development best-practices CISOSmartphones nowadays are powerful enough to match what laptops can do. Not only are they portable and easy to carry, but they are also essential beacons of communication and information that have become an integral part of our everyday lives. Due to its many advantages, the use of mobile technology is exponentially rising. Work landscapes and life as we know it has evolved rapidly because of the pandemic. People are now working from anywhere, and having a smartphone is not just a ‘must-have’—it is already a requirement to stay connected wherever we are in the world.
Cybersecurity Challenges of using Slack for your Business
cybersecurity remote-working employees CISO slackWith the dramatic shift to remote working we have witnessed during the pandemic, developments in communication and technology have gained momentum. The way we work isn’t the same as it used to be. To keep a collaborative environment even when working from home or wherever employees find themselves most productive nowadays, businesses rely on platforms like Slack. With 8 million plus daily users, the chat system gives teams a convenient and accessible way to communicate.
Topics
ai atlassian best-practices blockchain ciso climate-change cloud covid19 crime crypto culture customer-success cybersecurity data-protection development dlp employees gdpr infrastructure insider-threat malware office365 remote-working security semafore slack social-media technology work-experienceFeatured
AI vs. Web Developers - Collaboration or Competing?
AI vs Web Developers - Collaborative Innovation or Competing Forces in the Future of Web Development? Artificial Intelligence (AI) has come to the for...
Blockchain Technology & the Future of Cybersecurity
Over the past few years, we’ve been hearing more and more about crypto in emerging markets, digital money, blockchain technology, and other financial...