Blog / CISO

Attomus Infrastructure - an overview

infrastructure best-practices CISO   

We are often asked what the Attomus architecture looks like and how internally we approach development and client work and what tools we use. Clearly as partners of Netlify, Jetbrains, XCP-ng and Atlassian we tend towards using their products and services as the basis of our infrastructure, “eat your own dogfood” being the internal mantra, but there’s value in explaining the reasoning and how we utliise each to combine into the enterprise landscape that we operate.

Do you need a DLP Strategy?

dlp ciso data-protection gdpr   

The Importance of DLP Strategies in Business Today, data breaches are all too common and can happen quickly. A hacker might be able to compromise a laptop or workstation with access to customer information or steal data from the cloud server of a third-party vendor. It’s not just your own business that’s at risk either - you could also be subjected to an attack by organised hacking groups looking for their next big payday.

Online Hiring in the Cybersecurity Field

employees ciso   

In the present day, nearly all companies are digital. And if they’re not fully digital, they are quickly moving in that direction. Whether it be hiring, recruitment, employee management, or day-to-day tasks, most organisations function primarily with an internet connection. Online presence has become a vital element for companies nowadays and not just for gaining a profit. Did you know that 37% of job seekers will move on to another job offer if they can’t find information about the company online?

7 Tips for Better Mobile Application Security

development best-practices CISO   

Smartphones nowadays are powerful enough to match what laptops can do. Not only are they portable and easy to carry, but they are also essential beacons of communication and information that have become an integral part of our everyday lives. Due to its many advantages, the use of mobile technology is exponentially rising. Work landscapes and life as we know it has evolved rapidly because of the pandemic. People are now working from anywhere, and having a smartphone is not just a ‘must-have’—it is already a requirement to stay connected wherever we are in the world.

Cybersecurity Challenges of using Slack for your Business

cybersecurity remote-working employees CISO slack   

With the dramatic shift to remote working we have witnessed during the pandemic, developments in communication and technology have gained momentum. The way we work isn’t the same as it used to be. To keep a collaborative environment even when working from home or wherever employees find themselves most productive nowadays, businesses rely on platforms like Slack. With 8 million plus daily users, the chat system gives teams a convenient and accessible way to communicate.


ai atlassian banking best-practices blockchain ciso climate-change cloud counter-measures covid19 crime crypto culture customer-success cybersecurity data-management data-protection data-security development dlp employees gdpr governance identity-theft infrastructure insider-threat malware office365 offshoring phishing privacy remote-working risk-management robotics security semafore slack social-media technology trojan-horse work-experience


AI vs. Web Developers - Collaboration or Competing?

AI vs Web Developers - Collaborative Innovation or Competing Forces in the Future of Web Development? Artificial Intelligence (AI) has come to the for...

Blockchain Technology & the Future of Cybersecurity

Over the past few years, we’ve been hearing more and more about crypto in emerging markets, digital money, blockchain technology, and other financial...