Adil Hafa
Adil currently works as a CISO and he is a security expert with over 16 years of experience in a wide range of industries: Retail including online food ordering, finance including exchanges, defense and government.
Professional experience
Currently, Adil is the Chief Information Security Officer at Ödeal, a regional digital payment platform. Ödeal serves 125,000 merchants with its software and hardware based POS solutions.
His previous role was head of Global Security Testing at the global food ordering application, Delivery Hero. He was responsible for protecting Delivery Hero's systems, data, and customers from cyber threats. His team provided application security testing including dynamic application security testing (DAST) and penetration testing as well as red teaming, and bug bounty management for all Delivery Hero's platforms and applications.
Previously, he worked as a cyber security consultant, IT security tester and penetration tester
Education
Adil obtained an MSc degree in Computer and Information System Security / Information Security from İstanbul Şehir University in 2016.
Latest Articles from Adil
How AI transforms Cybersecurity: Real-Life Examples
By leveraging machine learning, advanced analytics, and automation, AI enables businesses to enhance their security posture, identify vulnerabilities, reduce response times, and allocate resources more efficiently. However, AI is also a double-edged sword; cyber threats are also evolving due to developments in network security and generative AI.
Top Firewall Management Tools: Analysis & Comparison
As the CISO of an enterprise managing firewalls from multiple vendors, I have seen that a unified firewall management tool is essential to streamline configuration & ensure compliance and reduce the complexity & work load. I have compiled the top 12 solutions.
Top +10 ZTNA Solutions: Ratings, Size & Pricing
With around 22 million U.S. adults (~14% of the total employed population) working from home full-time, secure remote access is critical. Zero-trust network access (ZTNA) solutions address this need by ensuring only authenticated and authorized users have access to sensitive resources.
Top 10 Application Security Tools: Features & Pricing
Application breaches represent 25% of all security incidents.. Based on our extensive research and technical reviewers’ experience, we selected the top 10 application security tools. Within each vendor’s section, we outlined our rationale for our selection.
Top 6 Open-Source Log Analysis Tools: Wazuh, Graylog & more
As a CISO in a highly regulated industry with ~2 decades of cybersecurity expertise, I have worked with multiple SIEM-like log analysis platforms. From those, I picked the top 6 open-source log analysis tools.
Top 10 DAST Tools: Benchmarking Results & Comparison
As a CISO, I have worked extensively with DAST tools. In evaluating the top solutions, I reviewed capabilities such as accuracy, detection performance by severity, and more. See below for a detailed breakdown of my key takeaways: DAST benchmark results True and false positive rates Benchmark environments: 1.
Top 10 IAST Tools: Evaluating Focus, Integration, and Features
Over the course of my 17 years in cybersecurity, including time as CISO at a fintech serving 125,000 merchants, I’ve gained experience with the evolution of interactive testing methods. Through working on Proofs of Concept (PoCs) with several vendors, I’ve gained insights that have helped me compile the list below.
AI Firewall vs NGFWs: Detailed Analysis & Comparison
A threat hunt is estimated to take 194 days to identify an advanced persistent threat (APT), according to cyber security stats. To improve the threat detection and prevention process, businesses are increasingly relying on artificial intelligence-based security solutions, leading to the AI in the cybersecurity market being projected to reach approximately $45 billion by 2027.
Top 5 Open Source MDM Software
Mobile devices are a significant source of business data breaches. While some companies require sophisticated closed-source MDM software, others prefer open-source solutions to protect their devices.
Analysis of Top 7+ Open Source Firewall Management Tools
It is crucial for businesses to prioritize robust network security to mitigate the substantial costs associated with data breaches, averaging over $4 million globally, according to cybersecurity statistics. To safeguard the firewall security and integrity of their sensitive data, businesses rely on firewall security management services.
AIMultiple Newsletter
1 free email per week with the latest B2B tech news & expert insights to accelerate your enterprise.