The AI Cybersecurity Arms Race: Do Attackers or Defenders Have the Upper Hand?

Explore the current cybersecurity AI arms race between hackers and defenders: how it’s being used, who has the edge, and what it means for the future.
Cloud security testing strategies for fintech AWS and Azure deployments

Discover cloud security strategies for fintech AWS and Azure deployments in OnSecurity’s latest blog
The Importance of Mobile Application Penetration Testing Services, and How to Pick a Vendor

Mobile application penetration testing is a critical component of any organisation with a mobile app that collects or handles sensitive data. This blog will explain what mobile application penetration testing […]
5 ways outdated software and operating systems put your business at risk

Outdated software and operating systems can leave your business vulnerable to cyberattacks, with potentially devastating consequences. Discover the risks they pose, and find out how to mitigate them to strengthen your business’s cybersecurity.
How telecom providers can use penetration testing to strengthen their defence against advanced persistent threats (APTs)

Telecommunications providers are prime targets for nation-state actors and advanced persistent threats (APTs) due to their central role in national infrastructure and access to vast amounts of sensitive data. These […]
How can generative AI be used in cybersecurity?

Discover how generative AI is transforming cybersecurity for attackers and defenders. Learn the real risks, practical defensive applications, and future trends in AI-powered security.
PCI DSS compliance testing: What fintech companies need to know before their assessment

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.
Understanding Vibe coding and AI-generated code in cybersecurity

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.
Penetration Testing into Your CI/CD Pipeline: A DevSecOps Guide

Learn how to integrate penetration testing into CI/CD pipelines seamlessly. Expert tips for balancing speed and security in DevSecOps.
What is a manual penetration test?

The term “penetration testing” or “pentesting” might be familiar, but the different types available—and how each can enhance your business’s cybersecurity posture—are not always clear. In this blog, we dive […]