Category: Security
-
Testing the boundaries: The story of a voluntary pen-test exercise
Organizations are adopting digital transformation at an unprecedented speed. What could have been considered pioneering actions a few years ago…
-
Three common security threats for Microsoft Azure users
For the past ten years or so, cloud computing has become the standard way of doing business, for both small- and large-scale organizations. The…
-
2021 under the microscope: The A to Z of security threats – Part 1
If we are to describe the last couple of years, “unprecedented times” is such an understatement. We have gone through a lot of dramatic events…
-
2021 under the microscope: When cybercriminals play hide-and-seek – Part 2
In the first part of our 2021 retrospective, we tried to solve the equation of security incidents. For this, we analyzed what types of fraud…
-
The Evolution of GDPR from adoption to present day
The General Data Protection Regulation (GDPR) turns 4 on May 25th. It is one of the most impactful laws active in the European Union and it is…
-
Security trends, predictions, and priorities for businesses in 2022
As digital transformation accelerates in many industries and organizations rethink office work, cyber attacks are diversifying and reaching unprecedented…
-
2021 under the microscope: The domino effect of security incidents – Part 3
In the first two parts of the 2021 overview, we discussed the context in which sophisticated attacks emerged, the industries that were severely…
-
How we develop secure web applications at Zitec
The key to secure web applications is understanding that cybersecurity is not a challenge we can solve with a vulnerability scan now and then…