featured

Blog / featured

Attomus Infrastructure - an overview

infrastructure best-practices CISO featured   

We are often asked what the Attomus architecture looks like and how internally we approach development and client work and what tools we use. Clearly as partners of Netlify, Jetbrains, XCP-ng and Atlassian we tend towards using their products and services as the basis of our infrastructure, “eat your own dogfood” being the internal mantra, but there’s value in explaining the reasoning and how we utliise each to combine into the enterprise landscape that we operate.

Reflections on My Work Experience with Attomus

work-experience semafore featured   

“I worked with Attomus remotely over a period of three weeks and completed two main tasks for the company both relating to the new app Semafore. Semafore is a highly secure communications service, targeted for the use of enterprises and government agencies who need more security than your average company. One task, which I completed by myself, was to update the Semafore website to make it look sleeker and more dynamic by changing the images on the front page of the website.

How Social Media Changed Cybersecurity

social-media cybersecurity featured   

The rise of social media has changed the way the internet’s bad actors conduct their operations. Organisations are even more vulnerable due to the plethora of private information that is accessible to those who intend to harm them. (image credit: rawpixel.com) A 2022 survey recorded 39% of businesses in the United Kingdom as cyber-attack victims. Phishing attempts have been marked as the most common form of attacks, with 83% of respondents experiencing these, while more sophisticated attacks such as malware, denial of service or ransomware were also reported.

How To Secure Your Cold Wallets

crypto featured   

How To Secure Your Cold Wallets From Hackers To keep your cryptocurrency investments secure, you must know how to keep your coins safe. With the ever-growing popularity of cryptocurrencies, cyber security threats have skyrocketed. Hackers are always looking for a weak spot in your system and will do anything they can to find it and take advantage of it. Your cold wallets are among the most vulnerable points on your network, but there are certain techniques that can be used to protect them.

Do you need a DLP Strategy?

featured dlp ciso data-protection gdpr   

The Importance of DLP Strategies in Business Today, data breaches are all too common and can happen quickly. A hacker might be able to compromise a laptop or workstation with access to customer information or steal data from the cloud server of a third-party vendor. It’s not just your own business that’s at risk either - you could also be subjected to an attack by organised hacking groups looking for their next big payday.

Topics

ai atlassian best-practices ciso climate-change cloud covid19 crime crypto culture customer-success cybersecurity data-protection development dlp employees gdpr infrastructure insider-threat malware office365 remote-working security semafore slack social-media technology work-experience

Featured

Technology Stack for Customer Success Teams

As competition continues to get tougher, businesses look for new ways to stay ahead of the game. Thanks to technology, businesses of any size have acc...

Can AI Help Reduce the Carbon Footprint of the Retail Industry?

The COVID-19 pandemic has affected the lives of many people on all fronts. Besides making the importance of health and immunity more evident to all, i...