Contact Us
No results found.
Adil Hafa

Adil Hafa

Technical Advisor
19 Articles
Stay up-to-date on B2B Tech

Adil currently works as a CISO and he is a security expert with over 16 years of experience in a wide range of industries: Retail including online food ordering, finance including exchanges, defense and government.

Professional experience

Currently, Adil is the Chief Information Security Officer at Ödeal, a regional digital payment platform. Ödeal serves 125,000 merchants with its software and hardware based POS solutions.

His previous role was head of Global Security Testing at the global food ordering application, Delivery Hero. He was responsible for protecting Delivery Hero's systems, data, and customers from cyber threats. His team provided application security testing including dynamic application security testing (DAST) and penetration testing as well as red teaming, and bug bounty management for all Delivery Hero's platforms and applications.

Previously, he worked as a cyber security consultant, IT security tester and penetration tester

Education

Adil obtained an MSc degree in Computer and Information System Security / Information Security from İstanbul Şehir University in 2016.

Latest Articles from Adil

CybersecurityMar 5

Top 10 Application Security Tools: Features & Pricing

The global application security market was valued at USD 10.65 billion in 2025 and is projected to reach USD 42.09 billion by 2033, with a 18.8% CAGR, driven by surging attacks on web and mobile applications, cloud-native adoption, and regulatory requirements, including the EU Cyber Resilience Act.

CybersecurityMar 4

Top 10 DAST Tools: Benchmarking Results & Comparison

As a CISO, I have worked extensively with DAST tools. In evaluating the top solutions, I reviewed capabilities such as accuracy, detection performance by severity, and more. See below for a detailed breakdown of my key takeaways: DAST benchmark results True and false positive rates Benchmark environments: 1.

CybersecurityFeb 26

Top 10 IAST Tools: Evaluating Focus, Integration, and Features

Over the course of my 17 years in cybersecurity, including time as CISO at a fintech serving 125,000 merchants, I’ve gained experience with the evolution of interactive testing methods. Through working on Proofs of Concept (PoCs) with several vendors, I’ve gained insights that have helped me compile the list below.

CybersecurityFeb 26

17 Best Data Loss Prevention (DLP) Software

Based on our DLP benchmark & features, here are the top data loss prevention tools.

CybersecurityFeb 26

Top 6 Device Control Software

Device control solutions are often offered alongside features like Data Loss Prevention (DLP) and Mobile Device Management (MDM) to address a wide range of security needs. Our analysis compares six solutions based on feature sets, integration capabilities, and user feedback from B2B review platforms.

CybersecurityFeb 25

Key Components of Firewall Compliance: Guidance

Cyber attacks are projected to cost nearly $16 trillion globally in 2029. These highlight the importance of the compliance to industry-specific security policies to strengthen cyber security. Firewall compliance with industry standards like ISO 27001, GDPR, NIST, SOX, and NERC CIP ensures that organizations meet regulatory requirements and mitigate the risk of cyber incidents.

CybersecurityFeb 25

Comparison of Top 10 Firewall Audit Software

Firewall audit software helps validate compliance and manage firewall configurations bulkily. Explore a comparison of leading firewall audit tools based on two approaches: Top 10 firewall audit products Features of firewall audit software benchmark Values that are zero are not shown in the chart.

CybersecurityFeb 23

Top 5 Open Source SOAR Tools

I’ve spent nearly two decades as a CISO in heavily regulated industries long enough to have tested, deployed, and ripped out more SOAR tools than I’d like to admit. Most open-source options look promising on documentation, but fall apart when you actually run them in production.

CybersecurityJan 20

AI Firewall vs NGFWs: Detailed Analysis

A threat hunt is estimated to take 194 days to identify an advanced persistent threat (APT), according to cyber security stats. To improve the threat detection and prevention process, businesses are increasingly relying on artificial intelligence-based security solutions, leading to the AI in the cybersecurity market being projected to reach approximately $45 billion by 2027.