Application SecurityProduct

Managing the Secure Development Process

When we started developing the platform which is the AppSec Flow today, our intentions were always to transform this in a central point where our clients could gather in one place not only data but also important information about their projects, auxiliating in our Secure Development Process. Nowadays we can, through Appsec Flow, gather in one platform all services that allow our clients to…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

Secure Development - Security in every pipeline

Nowadays we use the term “safe coding” or even “safe design” these terms are becoming more and more common among the creators of Secure development and Application Security. However, for this to be completely true in our development processes we need to truly understand this term’s concept, and how Application Security is connected to them.An article named, “A call to arms for…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application SecurityInfrastructure

Moving from DevOps to DevSecOps

Who should read this DevSecOps article? Whether your company produces or consumes software, understanding the best practices when moving from DevOps to DevSecOps is important to you. If your company does not operate any agile model or even DevOps practices, surely one of your suppliers uses this method in development. That’s a good reason for you to know more about each of them, and…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

Security Champion: you need to think about it

Security Champion and the battlefield There is an eternal battle inside your company: two of the most important areas are having conflicts for a very long time and it is necessary to end this. In companies that produce softwares it is common to have a dispute between two areas – Development & Security – To the development area, security teams are like a funnel for the…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

Why invest in AppSec Training

How can AppSec Training help? Aren’t you eager to know how training can help your company to reach maturity in Security Application Development? Training in Security is an investment that is not very fond of the organization. That is due to the lack of vision for results when analyzed in a short period of time scenario. In this article, we approach how Secure Development training can…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Infrastructure

Cloud Security: How Security is Affected

How secure is your data when it’s stored in the cloud? When it comes to Cloud Security, it is very common to believe that using a reputable server to store data online is enough to keep applications safe. Have you ever wondered if your business data is safe enough in the cloud? Of course, large companies that work with this type of service invest heavily in Cloud Security. But it…
Read more

How to increase the security of your container

Immutable Infrastructure in AppSec

Application SecurityInfrastructure

API Security: 6 main points

Have you ever stopped and evaluated the security of your APIs? In this article the approach is on how this resource has facilitated the implementation of solutions, bringing also some risks to application security. Get to know why it is important to evaluate API security, learn the main points that must be observed to keep them safe. API Security: why thinking of it? The adoption of…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

What Is Threat Modeling

Contextualization Why should we think on threat modeling? Well, during the software development process, some steps must be observed so the final result is truly a secure application and is able to reach all established requisites. New policies and normatives are being created so data owners will have the guarantee that their information is secured. Privacy has become an overrated therm…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

3 Benefits of Threat Modeling

What are the benefits of Threat Modeling? To complete the idea on the post about Threat Modeling, on this post the approach is on the benefits might not be directly visualized quen applied to threat modeling. In case you have started the reading by this post perhaś it is better to start by the “Basic Concepts of Threat Modeling”. On our previous article it was explained a little on the…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker