Understanding Vibe coding and AI-generated code in cybersecurity

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.
Penetration Testing into Your CI/CD Pipeline: A DevSecOps Guide

Learn how to integrate penetration testing into CI/CD pipelines seamlessly. Expert tips for balancing speed and security in DevSecOps.
How Much Does Pentesting Cost?

Penetration testing is a crucial investment in your organisation’s cybersecurity, but understanding the associated costs can be challenging. While there’s no one-size-fits-all price tag, several key factors determine the investment […]
What is the Difference between Internal vs External Penetration Testing?

External and internal penetration testing both exist as part of a broader cybersecurity strategy, supporting organisations in pinpointing vulnerabilities through the simulation of real-world cyber attacks. Both empower organisations to […]
Firewall Penetration Testing: Processes and Benefits

Firewall penetration testing is a method of locating, scoping, and penetrating a specific firewall to test an organisation’s network infrastructure. With a firewall being the first line of defence against […]
What is Dora Regulation? A Guide to Achieving Digital Operational Resilience

Enforceable by January 2025, the EU’s Digital Operational Resilience Act (DORA) introduces a landmark EU regulation framework, designed to help financial entities in the sector mitigate threats. This impacts both […]
What is a manual penetration test?

The term “penetration testing” or “pentesting” might be familiar, but the different types available—and how each can enhance your business’s cybersecurity posture—are not always clear. In this blog, we dive […]
How can Internal Penetration Testing Strengthen your Security Posture?

Sometimes referred to as ‘internal infrastructure tests’, or ‘internal network tests’, internal penetration tests are the backbone of any thorough cybersecurity audit. The primary purpose of internal pentesting is to […]
Ethical hacking vs penetration testing: what is the difference?

Ethical hacking and penetration testing are essential cybersecurity practices that uncover security vulnerabilities by simulating attacks on an organisation’s network. While both aim to identify and mitigate risks, they differ […]
A Year in Review with OnSecurity’s CEO

2024 has been a transformative year for the OnSecurity team, marked by progress and significant milestones. To celebrate the company’s achievements and reflect on its journey thus far, I had […]