Application Security

Which topics should an AppSec Training Contemplate?

The development market seems to be becoming more and more aware of the need for Application Security Training (AppSec). However, the market still looks for generic training, which often meet compliance issues, but do not add real value to development teams. Therefore, this article will present the characteristics and subjects for a good AppSec training. The Target Audience in AppSec…
Read more

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Conviso and N-Stalker join forces in application security

Application Security

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Last September, Conviso and N-Stalker announced that the two companies would now join forces and align their application security strategies. Now, N-Stalker’s technology will be combined with the technology of AppSec Flow – Conviso’s main product – to offer the global market a more complete product. To explain how it will impact the application security market , as well…
Read more

Which topics should an AppSec Training Contemplate?

Conviso and N-Stalker join forces in application security

Application Security

Conviso and N-Stalker join forces in application security

Conviso Application Security, a pioneer in application security in Brazil, and N-Stalker, a company specialized in developing web application security analysis solutions, join forces and align their application security strategy by combining N-Stalker technology as a module of AppSec Flow, Conviso’s main product, presenting a more complete DevSecOps platform, aligned with market demands…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

AppSec in the process of digital transformation

Another episode of AppSec to Go is on the air. The third episode of Conviso’s podcast addresses the theme of AppSec in the process of digital transformation. This time, the host is Nícolas Schmaltz, leader of the Consulting & Training team. To enrich the chat, the guest of the occasion is Guilherme Silva, a specialist in Information Security.  Silva has experience in implementing…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

IAM and CI/CD security

We already know that some IT paradigms must be rethought when we look at the world of cloud security. Identity Access Management is one of these concepts. When we think about cloud security, one of the main and most important points is to define and work correctly how we will manage Identities. The concept of Identity Access Management in the cloud can be applied to a large set of things.
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application SecurityInfrastructure

How to increase the security of your container

In our first article – Is your container really secure? on security of containers, we questioned whether the containers we are used to using are natively secure. Our goal was to warn that the use of containers is also observed more carefully. So, basically what we answered was “what is not secure about containers? In this article, our goal is to extend a little more on this…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

Application Security Differences - web and mobile

With the market of mobile application development (the famous “mobile apps”) growing considerably, attacks on mobile applications have also started to receive more attention, as already explained in our article on the mobile security scenario in 2020. As a result, many developers and security experts are increasingly looking to learn about security within mobile applications.
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

Is your container really secure?

In recent years, the use of containers to pack and deliver our applications has become increasingly present in development processes. Therefore, it is important to understand how we can guarantee the security of our containers and, consequently, of your applications. But we don’t want to take too much of your time talking again about some relevant points for this article, we suggest to…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

Is your software supply chain secure?

When we think of a supply chain, a company in the industrial area and its factory receiving its raw materials soon comes to mind. This thought is not incorrect, but we must remember that the term “supply chain” refers to the delivery of inputs for the production of some good or service. The supply chain in software production is often neglected precisely because of this vision, an…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker