Application Security

AppSecFlow - Vulnerability Management Process in a single Dashboard

The amount of information and data generated during the development process, or even when testing your systems is extremely important for good management performance. The lack or difficulty on finding information is, without a doubt, a point that takes as much for the vulnerability management process as for other secure development processes, a very big burden. It is not rare to find in…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application SecurityMobile

Mobile Security scenario in 2020

According to a survey conducted by FGV (a Brazilian institution) in 2019, today there are 235 million smartphones in Brazil. And if we count digital devices, in general, we reach the number of 420 million. The penetration power of mobile devices in people’s lives is unquestionable. But how is the mobile security scenario in 2020? Nowadays Smartphones represent 56% of Brazilians&#8217…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

6 security tips for software development

The security for software development must take into consideration many factors such as Client’s necessity, target, and the demand for agile delivery are just some details on the routine of a development team. The care for security, for instance, is essential in modern application. Even in the case of simple mobile apps, we cannot ignore the need to work with secure development…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

OWASP and its importance to Application Security

Application Security and software is simply one of the most important steps in planning for development. After all, the level of reliability is what will determine its success, and this will be reflected in the number of active users in the application, for example. And there’s no way to talk about security without mentioning OWASP. The collaboration of IT professionals is essential to…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application SecurityInfrastructure

System Hardening, What it is and how to execute it

When we talk about System Hardening we are referring to the analysis done on systems that will host the application in search of services, default configurations, logic gates and other unnecessary things for that application. Whenever we deal with web Application Security with our customers we make it very clear that there is no web application security if it is not supported by a well…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

Web Application, Is it safe?

Recently we had the disclosure of some more data made available by Statista that shows that our country was the most affected by attacks on web applications in 2019. Certainly, this type of data leads us to question the security of our web applications and try to understand why we still have so many applications being made available with already well-known…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

3 errors in the secure coding process

Vulnerabilities are the result of human error. Many don’t like it, but most web application security issues are the result of errors during the coding process. Therefore, if we think more clearly, the best approach to creating secure software is to do everything possible to avoid errors in the development process. When we talk about training on the most common mistakes made by…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

Objectives for the development team in 2020

We came to that time of the year where everyone starts to think in their objectives and what they must achieve this year. This also happens to security professionals who start defining their objectives for the development team and how to reach them. Moreover we are listing some points considered to be important and must be inserted into the objectives list of a development team od…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker

Application Security

Code Review and Pentest, What they are and when to use them

It is still common in the market to find companies with some doubts when it comes to safe development. For example, what are the differences between code review and pentest. One of these doubts is related to the correct moment of some types of tests execution in the safe development process. Thinking about it, we will present some concepts and information that we hope will clarify these…
Read more

Which topics should an AppSec Training Contemplate?

Webinar - What changes for AppSec Flow with the union of forces between Conviso and N-Stalker