BLOG 01-01

Welcome to Ethiack Blog

Here we discuss cybersecurity for technology companies and enterprise businesses.

You’ll find information on best practices, the latest trends, write-ups, and opinion pieces from our team of Ethical Hackers on how to keep your digital infrastructure safe.

ETHIACK-Digital Exposure Analysis Portugal (1)
Digital Exposure Analysis of the 500 Largest Portuguese Companies

Learn more about our non-intrusive report which reveals what Portuguese companies should do to improve their security posture.

CS CEGID
From Checklist-based Pentesting to Autonomous Ethical Hacking: What Changed for CEGID

Discover how Ethiack and Autonomous Ethical Hacking helped CEGID in their offer of dozens of software solutions, often in critical sectors dealing with sensitive data.

Ethiack-WebSummit
Securing Success: Ethiack is The Most Promising Startup at Web Summit 2023

Ethiack won the Most Promising Startup Award in the Web Summit 2023. This was part of Road 2 Web Summit, a joint initiative by Startup Portugal, Galp, and Web Summit.

Ethiack-Portugal Fintech Report 2023
Ethiack Featured in the Portugal Fintech Report 2023

Ethiack is featured in the Portugal Fintech Report 2023 as an Emerging Fintech, along with an insightful article about cybersecurity from our CEO.

Blog Cover NIS2
Everything Financial Institutions Need to Know about the NIS2 Directive

Take a deep dive into how the European Union has ushered in a new era of cybersecurity with the introduction of the NIS2 Directive.

ETHIACK-INVENTÁRIO DE ATIVOS CIBERSEGURANÇA (4)
Regime Jurídico da Segurança do Ciberespaço: Inventário de Ativos

Tudo o que precisa de saber sobre o Inventário de Ativos para Cibersegurança relativo às alterações regulamentares na Lei n.º 46/2018 e o Decreto-Lei n.º 65/2021.

Blog Post - Ethiack Culture
Ethiack Culture: We T.E.S.T when we test

Know more about life at Ethiack and what we follow while finding vulnerabilities and protecting digital progress by staying true to our values. Discover what TEST means and how we apply it to everything we do.

Blog-cover-rez0
How to use AI and Automation for Ethical Hacking and Vulnerability Assessment

AI will enable huge leaps in automation. Discover how cutting-edge AI tools are reshaping cybersecurity.

Blog DORA
Navigating DORA: What Every Financial Institution Needs to Know

DORA, the legislation that aims to ensure that financial institutions are taking the necessary steps to protect themselves and their customers.

Ethiack 2.0 Walkthrough
Full Walkthrough: Ethiack 2.0

Discover all the new features from the Ethiack 2.0 version. Export reports, manage findings, and vulnerabilities, and assess your current exposure risk score. 

CS CRITICAL SOFTWARE
Protecting Critical Software with Machine Ethical Hacking

Critical Software develops software for the most critical industries. Learn more about how our Machine Ethical Hacking helps to keep their assets safe.

CS COMPLIANCEWISE-1
Continuous Security Assurance for ComplianceWise: Adapting to an Ever-Evolving Landscape

Discover how ComplianceWise keeps its cybersecurity a priority. 

Case-study-wallim
Small and Safe: How Wallim Uses Machine Ethical Hacking to Keep Their Applications and User's Data Safe

Wallim combines apparel with technology, learn more about it.

Bug Bounty vs Pentest
Bug Bounty VS Pentesting for SaaS: Which one should you choose?

Learn everything about choosing between Bug Bounty Programs or Pentesting to keep you company ahead of cyber threats.

ISO 27001 Ethiack
We’re now ISO 27001 certified! Here’s what this means for you

Ethiack is now ISO 27001 certified. Read more about our process and how will this allow us to keep innovating in Autonomous Ethical Hacking.

pentesting-no-more
Pentesting no more: Why it's time to move from Pentesting to Ethical Hacking

In an era of intensive risks in the digital realm, organizations should adopt a more straight-to-the-point approach.

united-against-cyber-enemies
Opinion Article | United Against Cyber Enemies

Nowadays it becomes crucial to validate and prioritize vulnerabilities according to the actual risk they pose to organizations so that security teams can focus on the mitigation.

Case Study BaladAPP
Don’t Stop The Party: How BaladAPP Is Keeping Their Users Safe With Autonomous Ethical Hacking

BaladAPP is the leading app in Brazil for event management. Learn more about security prioritization. 

PNI23
Ethiack distinguished as a Leader in Innovation in Portugal

Ethiack won the first edition of the Prémio Nacional de Inovação in the Cybersecurity category due to our Autonomous Ethical Hacking platform.

vulnerabilities-in-saas-cover
Identifying Vulnerabilities in SaaS: The Guide Updated for 2023

In this guide, we explain everything you need to do to protect your SaaS to avoid data leaks, ransomware and keeping your business safe.

expresso-andre-baptista-cover
If you want peace, prepare for cyberwar

This opinion article was written by our CTO André Baptista, and originally published on Expresso. Read the translated piece here.

writeup-git-cve-cover
Git Arbitrary Configuration Injection (CVE-2023-29007)

Read all about the Git Arbitrary Configuration Injection (CVE-2023-29007) found by our experts André and Vitor. 

webinar-supply-chain-cover
Webinar | Cybersecurity in Supply-Chain

Learn about third-party risk, choosing 3rd party SaaS/cloud solutions vs on-premises, MSSPs External security providers and ethical hacking. 

risk-assessment-cover
Risk Assessment: What is it and how to conduct one

This is a crucial step in developing a comprehensive security program and staying ahead of evolving threats. Find out more about risk assessment.

pentest-ethical-hacking-cover
What is a Pentest: How ethical hacking can protect you

Learn about pentesting and how offensive cybersecurity prevents society's digital structures from collapsing.

hello-world-cover
Hello World

In the digital dimension, chaos may emerge if technology is disrupted. We secure technology business through Autonomous Ethical Hacking.