Application Security

Phishing scam using Conviso's name: don't fall for it!

In the past few days, a few customers have reported to us that they have been receiving phishing emails from scammers using Conviso’s name. In this type of fraud, the scammer tries to obtain a user’s personal and financial data, through the combined use of technical means and social engineering. From what we have seen, in this particular case, the scammers’ strategy is to try to…
Read more

Webinar: PIX and the Secure Development

Which topics should an AppSec Training Contemplate?

Application Security

Webinar: PIX and the Secure Development

Much has been discussed about PIX, the new digital and instant Brazilian payment system developed by Banco Central (Bacen). However, have you ever stopped to think about the role of Secure Development within this new instant payment system? To address the topic, Conviso held a free webinar on the topic on October 29th. To avoid scams and fraud, how should fintechs and financial institutions…
Read more

Phishing scam using Conviso's name: don't fall for it!

Which topics should an AppSec Training Contemplate?

Application Security

Which topics should an AppSec Training Contemplate?

The development market seems to be becoming more and more aware of the need for Application Security Training (AppSec). However, the market still looks for generic training, which often meet compliance issues, but do not add real value to development teams. Therefore, this article will present the characteristics and subjects for a good AppSec training. The Target Audience in AppSec…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Last September, Conviso and N-Stalker announced that the two companies would now join forces and align their application security strategies. Now, N-Stalker’s technology will be combined with the technology of AppSec Flow – Conviso’s main product – to offer the global market a more complete product. To explain how it will impact the application security market , as well…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

Conviso and N-Stalker join forces in application security

Conviso Application Security, a pioneer in application security in Brazil, and N-Stalker, a company specialized in developing web application security analysis solutions, join forces and align their application security strategy by combining N-Stalker technology as a module of AppSec Flow, Conviso’s main product, presenting a more complete DevSecOps platform, aligned with market demands…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

AppSec in the process of digital transformation

Another episode of AppSec to Go is on the air. The third episode of Conviso’s podcast addresses the theme of AppSec in the process of digital transformation. This time, the host is Nícolas Schmaltz, leader of the Consulting & Training team. To enrich the chat, the guest of the occasion is Guilherme Silva, a specialist in Information Security.  Silva has experience in implementing…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

IAM and CI/CD security

We already know that some IT paradigms must be rethought when we look at the world of cloud security. Identity Access Management is one of these concepts. When we think about cloud security, one of the main and most important points is to define and work correctly how we will manage Identities. The concept of Identity Access Management in the cloud can be applied to a large set of things.
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application SecurityInfrastructure

How to increase the security of your container

In our first article – Is your container really secure? on security of containers, we questioned whether the containers we are used to using are natively secure. Our goal was to warn that the use of containers is also observed more carefully. So, basically what we answered was “what is not secure about containers? In this article, our goal is to extend a little more on this…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

Application Security Differences - web and mobile

With the market of mobile application development (the famous “mobile apps”) growing considerably, attacks on mobile applications have also started to receive more attention, as already explained in our article on the mobile security scenario in 2020. As a result, many developers and security experts are increasingly looking to learn about security within mobile applications.
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development