Securing Subdomains: Mitigating Financial Risks Effectively

Discover how to mitigate financial risks from subdomain takeovers. Learn strategies to safeguard against reputational damage and data breaches.
Your business needs regular penetration testing. Here’s why.

What is Penetration Testing? Penetration Testing, otherwise known as “pentesting” or ethical hacking, is the beating heart of all good cybersecurity practice within an enterprise business. Penetration testing ethically simulates […]
SSDLC: From Planning to Deployment

Explore SSDLC stages: From planning to deployment. Learn how to secure web apps effectively with OnSecurity’s solutions.
Cloud Security Challenges for Businesses

Exploring Cloud Security: Risks, Regulations & Remedies. Learn from incidents & strategies for robust cloud protection in an evolving digital landscape.
Understanding the Digital Operational Resilience Act (DORA) and Compliance Requirements

Discover what the Digital Operational Resilience Act (DORA) means for cybersecurity in the financial sector. Learn the compliance requirements, and how to prepare with penetration testing.
Learning to Self Code, Navigating Change, and Coding in the age of AI: Staff Spotlight

For National Coding Week, we reached out to some of our software developers at OnSecurity to hear their perspective on the changing role of coding in the workplace. Ben Guest […]
How to safely use Public WiFi: Risks and Recommendations

With the rise of remote and flexible work policies, many employees have adopted cafes, libraries, and other public spaces as alternative work environments. While these settings offer a refreshing change […]
4 Founders, 1 Purpose: An Exclusive Founders Spotlight

Conor O’Neill is not your typical CEO. In 2023 he completed an Ironman marathon. He practises archery in his spare time, and at twenty-nine laboured in Australia digging trenches- a […]
Understanding the Mind of a Cybercriminal

How would we define Cybercrime? What do you imagine when you think of a cybercriminal? Do you envision an erratic, reactive hacker, randomly targeting businesses from a dingy bedroom? Or […]
Understanding the NIST Framework to protect your business

Explore the intricacies of this vital framework designed to fortify businesses against diverse cyber threats. Core principles and actionable guidance.