AIMultipleAIMultiple
No results found.
Adil Hafa

Adil Hafa

Technical Advisor
20 Articles
Stay up-to-date on B2B Tech

Adil currently works as a CISO and he is a security expert with over 16 years of experience in a wide range of industries: Retail including online food ordering, finance including exchanges, defense and government.

Professional experience

Currently, Adil is the Chief Information Security Officer at Ödeal, a regional digital payment platform. Ödeal serves 125,000 merchants with its software and hardware based POS solutions.

His previous role was head of Global Security Testing at the global food ordering application, Delivery Hero. He was responsible for protecting Delivery Hero's systems, data, and customers from cyber threats. His team provided application security testing including dynamic application security testing (DAST) and penetration testing as well as red teaming, and bug bounty management for all Delivery Hero's platforms and applications.

Previously, he worked as a cyber security consultant, IT security tester and penetration tester

Education

Adil obtained an MSc degree in Computer and Information System Security / Information Security from İstanbul Şehir University in 2016.

Latest Articles from Adil

CybersecurityNov 30

Top 9 User and Entity Behavior Analytics (UEBA) Tools

As a CISO in a highly regulated industry with ~2 decades of cybersecurity expertise, I compared the top 9 user and entity behavior analytics (UEBA) tools that can help SOCs detect abnormal and potentially dangerous user and device behavior: Feature comparison See feature descriptions.

CybersecurityNov 30

Top 10+ SOAR Platforms

With nearly 2 decades of cybersecurity experience in a highly regulated industry, I listed the best 10+security orchestration, automation, and response (SOAR) software: Compare the top 10 SOAR platforms: * Vendors with”✅” under the OS log support column support log collection from Linux, Unix, macOS, and Windows.

CybersecurityNov 30

Top 5 Open Source SOAR Tools

As a CISO in a highly regulated industry with ~2 decades of cybersecurity expertise, I listed the top 5 open-source security orchestration, automation, and response (SOAR) tools based on their features, usability, and user feedback: Features *MITRE ATT&CK labels are available. SOAR tools rely on accurate endpoint data and actionable device control.

CybersecurityNov 30

10 SOAR Use Cases with Real-World Workflow Examples

Generic use cases are particularly ineffective with SOAR, as they are highly dependent on the specific environment. The SOC, incident response team, and alert handling processes should be the key factors in determining how use cases are prioritized. Below, I outlined 10 SOAR use cases that are tailored to different environments and scenarios: 1.

CybersecurityNov 30

15 Best Data Loss Prevention (DLP) Software

Based on our DLP benchmark & features, here are the top data loss prevention tools.

CybersecurityNov 30

DLP Review: Benchmark Testing of 6 DLP Products

Leveraging my 2 decades of experience as a cybersecurity practitioner, I selected the top DLP software for securing sensitive information & complying with regulatory standards. I tested 6 of these DLP solutions over a month, focusing on key features like channel coverage, ease of deployment, and classification accuracy.

CybersecurityNov 30

Top 6 Device Control Software

Device control solutions are often offered alongside features like Data Loss Prevention (DLP) and Mobile Device Management (MDM) to address a wide range of security needs.

CybersecurityNov 28

Top 3 Open Source Firewall Audit Tools Compared

Open source firewall audit tools let IT teams see how their firewalls are set up, spot weak points, and learn how to fix them, without spending much. However, mid-market and enterprise companies may explore closed-source firewall audit software for more comprehensive solutions.

CybersecurityNov 18

Top 12 Firewall Audit Software & Integration-Based Comparison

As the Chief Information Security Officer of a fintech platform, compliance with standards like PCI DSS is a top priority for me. Also, nearly all firewall breaches stem from configuration errors, not the firewalls themselves. Since firewall audit software facilitate compliance & improve our security posture, I have reviewed all major solutions.

CybersecurityNov 18

Key Components of Firewall Compliance: Guidance

Cyber attacks are projected to cost nearly $10 trillion globally in 2024 and data breaches average $5 million each. These highlight the importance of the compliance to industry-specific security policies to strengthen cyber security.