AIMultipleAIMultiple
No results found.
Adil Hafa

Adil Hafa

Technical Advisor
17 Articles
Stay up-to-date on B2B Tech

Adil currently works as a CISO and he is a security expert with over 16 years of experience in a wide range of industries: Retail including online food ordering, finance including exchanges, defense and government.

Professional experience

Currently, Adil is the Chief Information Security Officer at Ödeal, a regional digital payment platform. Ödeal serves 125,000 merchants with its software and hardware based POS solutions.

His previous role was head of Global Security Testing at the global food ordering application, Delivery Hero. He was responsible for protecting Delivery Hero's systems, data, and customers from cyber threats. His team provided application security testing including dynamic application security testing (DAST) and penetration testing as well as red teaming, and bug bounty management for all Delivery Hero's platforms and applications.

Previously, he worked as a cyber security consultant, IT security tester and penetration tester

Education

Adil obtained an MSc degree in Computer and Information System Security / Information Security from İstanbul Şehir University in 2016.

Latest Articles from Adil

CybersecurityJul 25

Top 9 User and Entity Behavior Analytics (UEBA) Tools

As a CISO in a highly regulated industry with ~2 decades of cybersecurity expertise, I compared the top 9 user and entity behavior analytics (UEBA) tools that can help SOCs detect abnormal and potentially dangerous user and device behavior: Feature comparison See feature descriptions.

CybersecurityAug 21

Top 5 Open Source MDM Software

Mobile devices are a significant source of business data breaches. While some companies require sophisticated closed-source MDM software, others prefer open-source solutions to protect their devices.

CybersecuritySep 16

10 SOAR Use Cases with Real-World Workflow Examples

Generic use cases are particularly ineffective with SOAR, as they are highly dependent on the specific environment. The SOC, incident response team, and alert handling processes should be the key factors in determining how use cases are prioritized. Below, I outlined 10 SOAR use cases that are tailored to different environments and scenarios: 1.

CybersecurityJul 25

Top 5 Open Source SOAR Tools

As a CISO in a highly regulated industry with ~2 decades of cybersecurity expertise, I listed the top 5 open-source security orchestration, automation, and response (SOAR) tools based on their features, usability, and user feedback: Features *MITRE ATT&CK labels are available.

CybersecurityJul 18

Top 10+ SOAR Platforms

With nearly 2 decades of cybersecurity experience in a highly regulated industry, I listed best 10+security orchestration, automation, and response (SOAR) software: Compare top 10 SOAR platforms: * Vendors with”✅” under the OS log support column support log collection from Linux, Unix, macOS, and Windows.

CybersecurityOct 1

How AI transforms Cybersecurity: Real-Life Examples

By leveraging machine learning, advanced analytics, and automation, AI enables businesses to enhance their security posture, identify vulnerabilities, reduce response times, and allocate resources more efficiently. However, AI is also a double-edged sword; cyber threats are also evolving due to developments in network security and generative AI.

CybersecuritySep 29

AI Firewall vs NGFWs: Detailed Analysis & Comparison

A threat hunt is estimated to take 194 days to identify an advanced persistent threat (APT), according to cyber security stats. To improve the threat detection and prevention process, businesses are increasingly relying on artificial intelligence-based security solutions, leading to the AI in the cybersecurity market being projected to reach approximately $45 billion by 2027.

CybersecurityJul 7

DLP Review: Benchmark Testing of 6 DLP Products

Leveraging my 2 decades of experience as a cybersecurity practitioner, I selected top DLP software for securing sensitive information & complying with regulatory standards. I tested 6 of these DLP solutions over a month, focusing on key features like channel coverage, ease of deployment, and classification accuracy.

CybersecurityJul 25

Analysis of Top 7+ Open Source Firewall Management Tools

It is crucial for businesses to prioritize robust network security to mitigate the substantial costs associated with data breaches, averaging over $4 million globally, according to cybersecurity statistics. To safeguard the firewall security and integrity of their sensitive data, businesses rely on firewall security management services.

CybersecuritySep 24

Top Firewall Management Tools: Analysis & Comparison

As the CISO of an enterprise managing firewalls from multiple vendors, I have seen that a unified firewall management tool is essential to streamline configuration & ensure compliance and reduce the complexity & work load. I have compiled the top 11 solutions.