Latest insights and updates.
From the blog
Podcast
API Security
Your APIs are leaking secrets: what you don't realize you're exposing
supply chain security
Podcast
The software supply chain risk you're probably ignoring
case studies
How Landspítali Gained Critical Cybersecurity Visibility
Buying security is an illusion, it has to be built
Introducing Aftra’s new API scanner: Take control of your hidden attack surface
Calculating ROI on cybersecurity investment
Cybersecurity
Why you shouldn’t put all trust in IT consultancies for cybersecurity
case studies
Achieving and maintaining a security score 95/100 with Aftra
A chat with the experts: Cybersecurity trends and predictions for 2025
Aftra in review: A look back on 2024
Holiday cybersecurity best practices to ensure a safe end to 2024
3 examples of serious cyber attacks organizations can learn from
Achieving strategic alignment between leadership and security: A KPI-driven approach to cyber resilience
Understanding DORA: NIS2’s Complementary Law for Financial Institutions
What is vulnerability scanning and how does it work?
Navigating the new NIS2 requirements: What’s new and who does it apply to?
Identify and minimize risks by increasing employee security awareness with Aftra’s new Security Campaigns
Cybersecurity Resilience: Strategies for Safeguarding Your Organization
Types of threats and vulnerabilities in cyber security
The Importance of Activating Incident Response
What is EASM and how does it work?
Cybersecurity is a Continuous Journey
3 Critical Steps on How to Avoid Cyber Attacks