In our first article – Is your container really secure? on security of containers, we questioned whether the containers we are used to using are natively secure. Our goal was to warn that the use of containers is also observed more carefully.
So, basically what we answered was “what is not secure about containers?
In this article, our goal is to extend a little more on this…
Talking about immutable infrastructure requires us to go back in time and start by explaining how they were, and in some cases still are, the infrastructures that support the vast majority of applications.
A few years ago, the entire infrastructure of an application was often shared. In other words, an application was hosted on servers that maintained not just one, but several…
When we talk about System Hardening we are referring to the analysis done on systems that will host the application in search of services, default configurations, logic gates and other unnecessary things for that application.
Whenever we deal with web Application Security with our customers we make it very clear that there is no web application security if it is not supported by a well…
Do you want to know what Remote Code Execution is and what steps to take to prevent vulnerabilities in your application?
To understand how forms, query components, and even cookies can make your application vulnerable to attack, let’s first look at what server-side is and how Remote Code Execution can be an exploited vulnerability along server-side.
So if you want to understand more…
Do you want to have a better understanding of the importance of API Security in Application Security?
To understand how API Security affects risk exposure to your application is important to know the way if is connected to the internet as well as on other resources in development.
Although it brings risks, APIs are fundamental to improve the application, and we all know that.
To…
In general, when we think about what is Security Architecture the term Security Architecture has different meanings and everything will depend on the context in which the term is placed.
The question of defining the term is so relevant to understanding that Gartner has reserved an entire article to describe his view of Safe Architecture. And for Gartner, the term means:
“In…
Who should read this DevSecOps article?
Whether your company produces or consumes software, understanding the best practices when moving from DevOps to DevSecOps is important to you.
If your company does not operate any agile model or even DevOps practices, surely one of your suppliers uses this method in development.
That’s a good reason for you to know more about each of them, and…
How secure is your data when it’s stored in the cloud?
When it comes to Cloud Security, it is very common to believe that using a reputable server to store data online is enough to keep applications safe.
Have you ever wondered if your business data is safe enough in the cloud?
Of course, large companies that work with this type of service invest heavily in Cloud Security. But it…
Have you ever stopped and evaluated the security of your APIs?
In this article the approach is on how this resource has facilitated the implementation of solutions, bringing also some risks to application security.
Get to know why it is important to evaluate API security, learn the main points that must be observed to keep them safe.
API Security: why thinking of it?
The adoption of…