Blog

Welcome to our blog. We are regularly sharing our cyber security insights and company updates.

ISO/IEC 42001:2023: A step-by-step implementation guide

ISO/IEC 42001:2023: A step-by-step implementation guide

With the rapid advance of AI technologies in the digital age, it is very important to manage them responsibly and

Penetration Testing Best Practices

Penetration Testing Best Practices

Some interesting insights on how to get the most of your pentest: from selecting the right vendor to proper project management.

ISO 27001 Implementation: Comprehensive Guide

ISO 27001 Implementation: Comprehensive Guide

In this post, we present a comprehensive guide on ISO 27001 implementation for companies: key steps/resources to establish an efficient ISMS and practical tips from our experts

Interview for Safety Detectives blog

Interview for Safety Detectives blog

Our CEO has recently given a small interview for the Safety Detectives blog covering our service focus and how we

Our client Open Social gains ISO 27001 certification

Our client Open Social gains ISO 27001 certification

We are happy to report that our client, a community platform Open Social, has recently gained ISO 27001 certification. Over

CVE-2021-21327: Remotely trigerring execution of your PHP objects in GLPI

CVE-2021-21327: Remotely trigerring execution of your PHP objects in GLPI

Our team discovered a CVE in a popular open-source ITSM and Service Center software GLPI. The vulnerability allows to remotely trigger certain initialization code.

Shift-Left Security: The Basics of Threat Modeling

Shift-Left Security: The Basics of Threat Modeling

Basics of the trendy shift-left security approach and specifically focusing on one extremely useful practise – threat modeling.

Launched our new website

Launched our new website

Just recently we’ve launched our new website and blog. Our insightful content plan for 2021 is ready so stay tuned!