IoT (Internet of Things) devices are increasingly present in our daily lives, from smartwatches to industrial control systems. However, as…
In this article, we will approach threat modeling according to the Software Security Maturity Model, also known by the acronym SAMM. It is…
An internal project by Conviso’s Consulting team, called ConsultingLabs, was created with the aim of exploiting vulnerabilities.
In…
Within the process of building a software, understanding its functionality, and identifying possible security requirements is a key…
Secure by Design is about building secure applications from scratch with a shift-left approach, being part of a complete AppSec program…
Within the OWASP community, there are several projects related to AppSec, among them a series entitled TOP 10, which has specific subjects…
Security is a relevant attribute for quality within a software architecture context. Therefore, it should be a priority. But what are the…
Today, having a secure software development cycle is a critical feature for developers to ensure that applications and systems can operate…
The process of security requirements analysis can be an arduous task. In this article we will see how automation through Python scripting…