Insights

Keep up to date with our blog articles

A bird in the hand is worth two in the bush. That has never been truer for Galah. We’re keen to establish long-term relationships with clients and provide quality service to them. Of course, we’re about birds here, but if you want it straight from the horses mouth.
5 reasons to prioritise cloud security observability
Cybersecurity

5 reasons to prioritise cloud security observability

Read More
Tactics for resolving mobile app vulnerabilities
AppSec as a Service

Could you have vulnerabilities lurking in your mobile app’s code?

Read More
Why undergo an application security assessment in 2024?
AppSec as a Service

Why undergo an application security assessment in 2024?

Read More
Cybersecurity

Rethinking CVEs: The Open Source Software Dilemma

Read More
4 AppSec metrics to measure your program’s effectiveness
AppSec as a Service

4 AppSec metrics to measure the effectiveness of your program

Read More
AppSec as a Service vs. point solutions in cyber security
AppSec as a Service

AppSec as a Service vs. point solutions in cyber security

Read More
Your playbook for protecting web applications from security threats
AppSec as a Service

Your playbook for protecting web applications from security threats

Read More
Why must organisations consider AppSec as a Service?
AppSec as a Service

Why must organisations consider AppSec as a Service?

Read More
Lessons from the Newcastle Tech Futures event
Cybersecurity Careers

Lessons from the Newcastle Tech Futures event

Read More
Weighing the challenges and benefits of bug bounty programs
Cybersecurity

Weighing the challenges and benefits of bug bounty programs

Read More
Beyond Coding: Why your developers need AppSec training
Cybersecurity

Beyond Coding: Why your developers need AppSec training

Read More
What are the risks of ignoring Application Security?
Cybersecurity

What are the risks of ignoring Application Security?

Read More
Backups v Replication: What is more effective against ransomware attacks?
Practical Cybersecurity Insights

Backups vs Replication: What is more effective against ransomware attacks?

Read More
Threat Modelling: A crucial player in the software development lifecycle
Practical Cybersecurity Insights

Threat Modelling: A crucial player in the software development lifecycle

Read More
Practical Cybersecurity Insights

Your guide to vulnerability prioritisation: What it is and why it matters

Read More
Practical Cybersecurity Insights

Understanding and Preventing JS Template Literal Injection Attacks

Read More
Practical Cybersecurity Insights

The future of secure code: Exploring the impact of AI

Read More
Cybersecurity

Strengthening software security: Why your business needs secure code review

Read More