Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Visma's Security Boost with Aikido: A Conversation with Nikolai Brogaard

"Aikido helps us catch the blind spots in our security that we couldn’t fully address with our existing tools. It’s been a game-changer for us beyond just the SCA (Software Composition Analysis) solutions we originally brought them in for." A little while ago, we shared that Visma chose Aikido Security for its portfolio companies. Recently, we had the pleasure of having Nicolai Brogaard, Service Owner of SAST & SCA over in our Belgian headquarters.

IAM is not (just) technology: There's real value in consistency

There’s no way around it: program management skills are a must for any IAM leaders, lest they wish to preside over a chaotic, disorganized mess. IAM initiatives often involve complex, interconnected systems and processes – and most of all, people. Without a firm grasp of program management, leaders risk delays, overruns and a final implementation that’s more like a Frankenstein’s monster than a well-running solution.

CrowdStrike to Acquire Adaptive Shield to Deliver Integrated SaaS Security Posture Management

Today, at the inaugural Fal.Con Europe, I’m excited to announce CrowdStrike’s agreement to acquire SaaS security leader Adaptive Shield. This acquisition will propel CrowdStrike to become the only cybersecurity vendor to provide full protection against identity-based attacks across the modern cloud ecosystem — from on-premises Active Directory to cloud-based identity providers and the growing landscape of SaaS applications — through a single unified platform.

How Ad Fraud Detection is Saving Money for Customers and Online Retailers

If you’ve ever run an online ad campaign, be it through an advertising agency or in-house, there’s a very high chance that you, too, have fallen victim to undetected ad fraud. It’s not pleasant to hear, but your ad dollars often find their way into the pockets of cyber crooks. The costs of ad fraud are astronomical and continue to grow year after year. In Q1 of 2024, ad networks experienced an 18% click fraud rate across desktop web (26%), mobile web (15%), and mobile in-app (10%).

The Role of Cloud Computing in Enhancing Cybersecurity

Cloud computing revolutionizes how organizations approach data security and threat prevention. The transformation of traditional security measures into cloud-based solutions marks a significant shift in protecting sensitive information and maintaining business continuity.

Java Offshore Development: A Strategic Guide for Businesses

With Java-based software in high demand, businesses increasingly consider offshore development a cost-effective and scalable solution. Offshore Java development on its own brings a lot of benefits; it allows the company to have access to the global talent market, pay less for operations costs and concentrate more on business action. In this article, we'll take a closer look at all the affecting factors and how businesses can best benefit from it.