Posted on

Privacy awareness: There’s more to privacy than the law

Recent years have seen big changes in privacy legislation in many countries. The differences in privacy laws of countries or regions can make this a tricky realm to navigate. Having respect for people’s privacy rights as a guiding principle — a north star if you will — will go a long way towards helping you navigate the choppy oceans of privacy compliance.

Continue reading Privacy awareness: There’s more to privacy than the law

Posted on

Secure development: Detecting attacks in your software

In this blog post, we cover ideas that were first discussed by our SafeStack Academy Secure Development community at our online members’ seminar on detecting attacks in software products, hosted by Christian Frichot and Erica Anderson.

Continue reading Secure development: Detecting attacks in your software

Posted on

Cyber security awareness: Spotting dangerous file attachments

As more people have been working from home or other locations that aren’t a physical office in the last couple of years, you may have heard there’s also been a spike in spam and phishing attempts.

Continue reading Cyber security awareness: Spotting dangerous file attachments

Posted on

Cyber security awareness: Safely sharing passwords in organisations

Our passwords do a lot of hard work for us. In simple terms, a password is a combination of characters, numbers, and symbols that protect our systems and accounts — and in turn, also protect the most valuable data we keep in our organisations.

Continue reading Cyber security awareness: Safely sharing passwords in organisations

Posted on

Why we’ve started an apprenticeship program

This week SafeStack welcomes three software development apprentices to our team. This is a huge moment for our tiny company and one I’m so very humbled to be able to share.


Continue reading Why we’ve started an apprenticeship program

Posted on

Cyber security awareness: Protect what matters with data classification

Digitisation and cloud computing mean that employees have the potential to access some of their employer’s most valuable assets — sensitive data and intellectual property. Teams need clear guidelines on what information should be most protected.


Continue reading Cyber security awareness: Protect what matters with data classification

Posted on

Cyber security awareness: Ten tips to stay safe from social engineering

Sometimes called the art of human hacking, social engineering is a type of attack where people are manipulated, influenced, or deceived into giving access to sensitive data and computer networks.

Continue reading Cyber security awareness: Ten tips to stay safe from social engineering

Posted on

SafeStack Academy’s 2021 year in review

I know I’m not the only one who feels like 2021 has somehow been the longest and shortest year of my life.

In some respects, the overwhelming presence of COVID-19 and the ongoing changes it’s brought to how we live our lives has created a sense of anxiety and stress that few of us have encountered before, let alone for an extended period.

Amongst all of this, however, this year has also been exceptional.


Continue reading SafeStack Academy’s 2021 year in review

Posted on

Cyber security awareness: What’s a password manager and why should I use one?

If you’ve been paying attention to the cyber security advice that regularly does the rounds (including from us), you’ll know “sort out your password habits!” tops the charts.

Continue reading Cyber security awareness: What’s a password manager and why should I use one?

Posted on

Secure development: Finding and fixing API security vulnerabilities

2021 has been a big year of growth for us. We’ve expanded our team, as well as the number of countries our customers are in.

We never lost sight of our mission though, to bring accessible, inclusive, industry-aligned security skills to all our customers and partners.

And what a great way to wrap up the end of 2021 — by releasing our newest SafeStack Academy Secure Development course: Finding and Fixing API Security Vulnerabilities.

Continue reading Secure development: Finding and fixing API security vulnerabilities