Contact Us
No results found.
Adil Hafa

Adil Hafa

Technical Advisor
19 Articles
Stay up-to-date on B2B Tech

Adil currently works as a CISO and he is a security expert with over 16 years of experience in a wide range of industries: Retail including online food ordering, finance including exchanges, defense and government.

Professional experience

Currently, Adil is the Chief Information Security Officer at Ödeal, a regional digital payment platform. Ödeal serves 125,000 merchants with its software and hardware based POS solutions.

His previous role was head of Global Security Testing at the global food ordering application, Delivery Hero. He was responsible for protecting Delivery Hero's systems, data, and customers from cyber threats. His team provided application security testing including dynamic application security testing (DAST) and penetration testing as well as red teaming, and bug bounty management for all Delivery Hero's platforms and applications.

Previously, he worked as a cyber security consultant, IT security tester and penetration tester

Education

Adil obtained an MSc degree in Computer and Information System Security / Information Security from İstanbul Şehir University in 2016.

Latest Articles from Adil

CybersecurityMar 26

Top 10+ SOAR Platforms in 2026

With nearly 2 decades of cybersecurity experience in a highly regulated industry, I listed the best 10+security orchestration, automation, and response (SOAR) software: Compare the top 10 SOAR platforms: * Vendors with”✅” under the OS log support column support log collection from Linux, Unix, macOS, and Windows.

CybersecurityMar 26

Top 9 User and Entity Behavior Analytics (UEBA) Tools

As a CISO in a highly regulated industry with ~2 decades of cybersecurity expertise, I compared the top 9 user and entity behavior analytics (UEBA) tools that can help SOCs detect abnormal and potentially dangerous user and device behavior: Feature comparison See feature descriptions.

CybersecurityMar 25

10 SOAR Use Cases with Real-World Workflow Examples

Generic SOAR use cases rarely hold up in practice; the right automation depends entirely on your environment, alert volumes, and how your SOC is structured. The use cases below are tailored to specific scenarios and include step-by-step workflow breakdowns.

Enterprise SoftwareMar 25

Top 5 Open Source MDM Software

Mobile devices are a significant source of business data breaches. While some companies require sophisticated closed-source MDM software, others prefer open-source solutions to protect their devices.

CybersecurityMar 13

DLP Review: Benchmark Testing of 6 DLP Products

Leveraging my 2 decades of experience as a cybersecurity practitioner, I selected the top DLP software for securing sensitive information & complying with regulatory standards. I tested 6 DLP solutions over a month, focusing on key features such as channel coverage, deployment ease, and classification accuracy.

CybersecurityMar 12

Top Firewall Management Tools: Analysis & Comparison

As the CISO of an enterprise managing firewalls from multiple vendors, I have seen that a unified firewall management tool is essential to streamline configuration & ensure compliance, and reduce the complexity & workload I have compiled the top 5 solutions.

CybersecurityMar 11

Top 6 Open-Source Log Analysis Tools: Wazuh, Graylog & More in 2026

As a CISO in a highly regulated industry with ~2 decades of cybersecurity expertise, I have worked with multiple SIEM-like log analysis platforms. From those, I picked the top 6 open-source log analysis tools.

CybersecurityMar 11

Top 10+ ZTNA Solutions: Ratings, Size & Pricing

With around 22 million U.S. adults (~14% of the total employed population) working from home full-time, secure remote access is critical. Zero-trust network access (ZTNA) solutions address this need by ensuring that only authenticated, authorized users have access to sensitive resources.

CybersecurityMar 5

Top 10 Application Security Tools: Features & Pricing

The global application security market was valued at USD 10.65 billion in 2025 and is projected to reach USD 42.09 billion by 2033, with a 18.8% CAGR, driven by surging attacks on web and mobile applications, cloud-native adoption, and regulatory requirements, including the EU Cyber Resilience Act.

CybersecurityMar 4

Top 10 DAST Tools: Benchmarking Results & Comparison

As a CISO, I have worked extensively with DAST tools. In evaluating the top solutions, I reviewed capabilities such as accuracy, detection performance by severity, and more. See below for a detailed breakdown of my key takeaways: DAST benchmark results True and false positive rates Benchmark environments: 1.