header logo

Latest insights and updates.

From the blog

The software supply chain risk you're probably ignoring
supply chain security
Podcast

The software supply chain risk you're probably ignoring

How Landspítali Gained Critical Cybersecurity Visibility
case studies

How Landspítali Gained Critical Cybersecurity Visibility

Buying security is an illusion, it has to be built

Buying security is an illusion, it has to be built

Introducing Aftra’s new API scanner: Take control of your hidden attack surface

Introducing Aftra’s new API scanner: Take control of your hidden attack surface

Calculating ROI on cybersecurity investment

Calculating ROI on cybersecurity investment

Why you shouldn’t put all your trust in IT consultancies for cybersecurity

Why you shouldn’t put all your trust in IT consultancies for cybersecurity

Achieving and maintaining a security score 95/100 with Aftra
case studies

Achieving and maintaining a security score 95/100 with Aftra

A chat with the experts: Cybersecurity trends and predictions for 2025

A chat with the experts: Cybersecurity trends and predictions for 2025

Aftra in review: A look back on 2024

Aftra in review: A look back on 2024

Holiday cybersecurity best practices to ensure a safe end to 2024

Holiday cybersecurity best practices to ensure a safe end to 2024

3 examples of serious cyber attacks organizations can learn from

3 examples of serious cyber attacks organizations can learn from

Achieving strategic alignment between leadership and security: A KPI-driven approach to cyber resilience

Achieving strategic alignment between leadership and security: A KPI-driven approach to cyber resilience

Understanding DORA: NIS2’s Complementary Law for Financial Institutions

Understanding DORA: NIS2’s Complementary Law for Financial Institutions

What is vulnerability scanning and how does it work?

What is vulnerability scanning and how does it work?

Navigating the new NIS2 requirements: What’s new and who does it apply to?

Navigating the new NIS2 requirements: What’s new and who does it apply to?

Identify and minimize risks by increasing employee security awareness with Aftra’s new Security Campaigns

Identify and minimize risks by increasing employee security awareness with Aftra’s new Security Campaigns

Cybersecurity Resilience: Strategies for Safeguarding Your Organization

Cybersecurity Resilience: Strategies for Safeguarding Your Organization

Types of threats and vulnerabilities in cyber security

Types of threats and vulnerabilities in cyber security

The Importance of Activating Incident Response

The Importance of Activating Incident Response

What is EASM and how does it work?

What is EASM and how does it work?

Cybersecurity is a Continuous Journey

Cybersecurity is a Continuous Journey

3 Critical Steps on How to Avoid Cyber Attacks

3 Critical Steps on How to Avoid Cyber Attacks

The Growing Economic Impact of Cybercrime Threats

The Growing Economic Impact of Cybercrime Threats

Interested in getting the latest blogs directly in your inbox?

Sign up for our newsletter.