Application Security

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Last September, Conviso and N-Stalker announced that the two companies would now join forces and align their application security strategies. Now, N-Stalker’s technology will be combined with the technology of AppSec Flow – Conviso’s main product – to offer the global market a more complete product. To explain how it will impact the application security market , as well…
Read more

4 tips for those who want to invest in a career in Application Security

"Forgot your password?" - The problem with security questions

Application Security

Conviso and N-Stalker join forces in application security

Conviso Application Security, a pioneer in application security in Brazil, and N-Stalker, a company specialized in developing web application security analysis solutions, join forces and align their application security strategy by combining N-Stalker technology as a module of AppSec Flow, Conviso’s main product, presenting a more complete DevSecOps platform, aligned with market demands…
Read more

4 tips for those who want to invest in a career in Application Security

"Forgot your password?" - The problem with security questions

Application Security

AppSec in the process of digital transformation

Another episode of AppSec to Go is on the air. The third episode of Conviso’s podcast addresses the theme of AppSec in the process of digital transformation. This time, the host is Nícolas Schmaltz, leader of the Consulting & Training team. To enrich the chat, the guest of the occasion is Guilherme Silva, a specialist in Information Security.  Silva has experience in implementing…
Read more

4 tips for those who want to invest in a career in Application Security

"Forgot your password?" - The problem with security questions

Application Security

IAM and CI/CD security

We already know that some IT paradigms must be rethought when we look at the world of cloud security. Identity Access Management is one of these concepts. When we think about cloud security, one of the main and most important points is to define and work correctly how we will manage Identities. The concept of Identity Access Management in the cloud can be applied to a large set of things.
Read more

4 tips for those who want to invest in a career in Application Security

"Forgot your password?" - The problem with security questions

Application SecurityInfrastructure

How to increase the security of your container

In our first article – Is your container really secure? on security of containers, we questioned whether the containers we are used to using are natively secure. Our goal was to warn that the use of containers is also observed more carefully. So, basically what we answered was “what is not secure about containers? In this article, our goal is to extend a little more on this…
Read more

4 tips for those who want to invest in a career in Application Security

"Forgot your password?" - The problem with security questions

Application Security

Application Security Differences - web and mobile

With the market of mobile application development (the famous “mobile apps”) growing considerably, attacks on mobile applications have also started to receive more attention, as already explained in our article on the mobile security scenario in 2020. As a result, many developers and security experts are increasingly looking to learn about security within mobile applications.
Read more

4 tips for those who want to invest in a career in Application Security

"Forgot your password?" - The problem with security questions

Application Security

Is your container really secure?

In recent years, the use of containers to pack and deliver our applications has become increasingly present in development processes. Therefore, it is important to understand how we can guarantee the security of our containers and, consequently, of your applications. But we don’t want to take too much of your time talking again about some relevant points for this article, we suggest to…
Read more

4 tips for those who want to invest in a career in Application Security

"Forgot your password?" - The problem with security questions

Application SecurityOWASP SAMM

Comparing SAMM & BSIMM models

OWASP is one of the best sources of knowledge for all professionals who wish to work with software development, and to have a robust knowledge in best practices of secure development. At CONVISO, we have OWASP as our source of studies and knowledge. Within OWASP projects, all very well structured and as an excellent knowledge, we use SAMM a lot, created as a maturity model for those who…
Read more

4 tips for those who want to invest in a career in Application Security

"Forgot your password?" - The problem with security questions

Application Security

Is your software supply chain secure?

When we think of a supply chain, a company in the industrial area and its factory receiving its raw materials soon comes to mind. This thought is not incorrect, but we must remember that the term “supply chain” refers to the delivery of inputs for the production of some good or service. The supply chain in software production is often neglected precisely because of this vision, an…
Read more

4 tips for those who want to invest in a career in Application Security

"Forgot your password?" - The problem with security questions