Application SecurityInfrastructure

How to increase the security of your container

In our first article – Is your container really secure? on security of containers, we questioned whether the containers we are used to using are natively secure. Our goal was to warn that the use of containers is also observed more carefully. So, basically what we answered was “what is not secure about containers? In this article, our goal is to extend a little more on this…
Read more

AppSec in the process of digital transformation

IAM and CI/CD security

Application SecurityInfrastructure

Immutable Infrastructure in AppSec

Talking about immutable infrastructure requires us to go back in time and start by explaining how they were, and in some cases still are, the infrastructures that support the vast majority of applications. A few years ago, the entire infrastructure of an application was often shared. In other words, an application was hosted on servers that maintained not just one, but several…
Read more

AppSec in the process of digital transformation

IAM and CI/CD security

Application SecurityInfrastructure

System Hardening, What it is and how to execute it

When we talk about System Hardening we are referring to the analysis done on systems that will host the application in search of services, default configurations, logic gates and other unnecessary things for that application. Whenever we deal with web Application Security with our customers we make it very clear that there is no web application security if it is not supported by a well…
Read more

AppSec in the process of digital transformation

IAM and CI/CD security

Infrastructure

Explaining Remote Code Execution

Do you want to know what Remote Code Execution is and what steps to take to prevent vulnerabilities in your application? To understand how forms, query components, and even cookies can make your application vulnerable to attack, let’s first look at what server-side is and how Remote Code Execution can be an exploited vulnerability along server-side. So if you want to understand more…
Read more

How to increase the security of your container

Immutable Infrastructure in AppSec

Application SecurityInfrastructure

API Security in Application Security

Do you want to have a better understanding of the importance of API Security in Application Security? To understand how API Security affects risk exposure to your application is important to know the way if is connected to the internet as well as on other resources in development. Although it brings risks, APIs are fundamental to improve the application, and we all know that. To…
Read more

AppSec in the process of digital transformation

IAM and CI/CD security

Application SecurityInfrastructure

At last, what is Security Architecture?

In general, when we think about what is Security Architecture the term Security Architecture has different meanings and everything will depend on the context in which the term is placed. The question of defining the term is so relevant to understanding that Gartner has reserved an entire article to describe his view of Safe Architecture. And for Gartner, the term means: “In…
Read more

AppSec in the process of digital transformation

IAM and CI/CD security

Application SecurityInfrastructure

Moving from DevOps to DevSecOps

Who should read this DevSecOps article? Whether your company produces or consumes software, understanding the best practices when moving from DevOps to DevSecOps is important to you. If your company does not operate any agile model or even DevOps practices, surely one of your suppliers uses this method in development. That’s a good reason for you to know more about each of them, and…
Read more

AppSec in the process of digital transformation

IAM and CI/CD security

Infrastructure

Cloud Security: How Security is Affected

How secure is your data when it’s stored in the cloud? When it comes to Cloud Security, it is very common to believe that using a reputable server to store data online is enough to keep applications safe. Have you ever wondered if your business data is safe enough in the cloud? Of course, large companies that work with this type of service invest heavily in Cloud Security. But it…
Read more

How to increase the security of your container

Immutable Infrastructure in AppSec

Application SecurityInfrastructure

API Security: 6 main points

Have you ever stopped and evaluated the security of your APIs? In this article the approach is on how this resource has facilitated the implementation of solutions, bringing also some risks to application security. Get to know why it is important to evaluate API security, learn the main points that must be observed to keep them safe. API Security: why thinking of it? The adoption of…
Read more

AppSec in the process of digital transformation

IAM and CI/CD security