Application SecurityInfrastructure

At last, what is Security Architecture?

In general, when we think about what is Security Architecture the term Security Architecture has different meanings and everything will depend on the context in which the term is placed. The question of defining the term is so relevant to understanding that Gartner has reserved an entire article to describe his view of Safe Architecture. And for Gartner, the term means: “In…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

The importance of Communication in DevSecOps

The importance of Communication in DevSecOps Do you want to understand more about the importance of Communication in DevSecOps? Believe it: eliminate murmur between teams is important and may help to prevent risks to secure development. When thinking in DevSecOps, the first things that come to mind are Continuous Security, Secure Development and the Shift Left mode. After all…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

Security Requirements - ASVS

ASVS Requirements in Application Security Do you want to understand more about what they are and what ASVS requirements do? In the scenario of application development, the term Security Requirements – ASVS is constant, but do you know exactly how to apply it? To better understand what ASVS is and what it is for, here are some basic concepts to help us build a solid path that…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

Continuous Application Security vs Pentest

Periodical pentest execution guarantees Application Security in Application? After all, why don’t we just execute pentest on our applications? If you have ever asked yourself this question, we brought some important considerations to reflect upon, before searching for a definite answer. We can say that nowadays the majority of business has a strong core-based on…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

Why invest in AppSec Training

How can AppSec Training help? Aren’t you eager to know how training can help your company to reach maturity in Security Application Development? Training in Security is an investment that is not very fond of the organization. That is due to the lack of vision for results when analyzed in a short period of time scenario. In this article, we approach how Secure Development training can…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

Privacy by Design and Data Security

Privacy by Design: Why it is important First of all, when we think about the concept of privacy by design, we need to bear in mind that it comprehends the incorporation of mechanisms to ensure the privacy and security of personal data to all development processes. Though, to understand this concept better, we need to go back a little and understand what privacy is. The modern idea of…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application SecurityInfrastructure

Moving from DevOps to DevSecOps

Who should read this DevSecOps article? Whether your company produces or consumes software, understanding the best practices when moving from DevOps to DevSecOps is important to you. If your company does not operate any agile model or even DevOps practices, surely one of your suppliers uses this method in development. That’s a good reason for you to know more about each of them, and…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

The importance of AppSec in Digital Transformation

Digital Transformation: The Beginning To the youngest, digital transformation may seem like a reality that has always been present. But for those who remember the reality of business before the 2000s probably remember a very strong turning point for the business. The thought of buying things over the Internet, check your accounts, exchanging images and music: all of this has characterized…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

Security Champion: you need to think about it

Security Champion and the battlefield There is an eternal battle inside your company: two of the most important areas are having conflicts for a very long time and it is necessary to end this. In companies that produce softwares it is common to have a dispute between two areas – Development & Security – To the development area, security teams are like a funnel for the…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development