Cybersecurity Blog

Keep up to speed with the latest security news, as well as updates to the Adversary security training platform.
Re-enact the Panama Papers Leak
Read more
Panama Papers Featured Blog
Clock5 Minute Read
3 Dangers of Learning by Pentest Report Alone
Penetration testing is an important part of the Software Development Lifecycle, but it's important to learn how to improve in many ways.

Penetration tests are a critical part of any organization’s security program. There’s no doubt that you should always be evaluating the state of the security of the organization on a regular basis. After all, if you (or a contracted third...

Clock6 Minute Read
It’s a Wrap: Adversary’s Highlights from 2019
2019 was an exciting year here at Adversary and we'd love to share with you our highlights.

The end of 2019 marks the end of a decade. Although Adversary hasn’t been around for anywhere close to a decade, sometimes it feels like it with all that we’ve accomplished in our very short history. Our story started in 2014 when our...

Clock4 Minute Read
How Dohop Used Adversary to Fulfill the PCI Security Training Requirement
Dohop needed an online tool to fulfill the security training requirement for PCI compliance. Read why Adversary was the right choice for them.

About Dohop

Dohop is a travel technology company. On their B2C side, they provide a flight comparison website that helps you find and compare flights. On the B2B side, they create and operate connection platforms for airlines and Interline...

Clock4 Minute Read
Your Developers Should be Your SDLC Immune System
The SDLC of an organization is not unlike the immune system of an organism. Here's how to strengthen your security health.

How do you go about ensuring the safety of the systems that your engineers develop? You can hire security experts (at great expense), who will review all code for security flaws. You can, and should, have a strict peer review process in...

Clock4 Minute Read
Shifting Left Will be a Key Survival Skill for Businesses in 2020
Being hacked is a question of when and not if. Shifting left will be key to mitigating the chances of experiencing an attack.

Originally posted on the Outpost 24 blog.

Clock4 Minute Read
Dangers of Learning Secure Coding on the Job and How to Mitigate Them
Security courses in computer science programs are scarce, meaning developers are forced to learn on the job. Here's how you can make the best of that situation.

A large portion of developers in the job market today have completed a Computer Science (CS) degree from a University This is generally the “standard” way of entering the field, if you’re not self-taught. But what exactly is Computer...