Application Security

Webinar: PIX and the Secure Development

Much has been discussed about PIX, the new digital and instant Brazilian payment system developed by Banco Central (Bacen). However, have you ever stopped to think about the role of Secure Development within this new instant payment system? To address the topic, Conviso held a free webinar on the topic on October 29th. To avoid scams and fraud, how should fintechs and financial institutions…
Read more

Phishing scam using Conviso's name: don't fall for it!

Which topics should an AppSec Training Contemplate?

Application SecurityProduct

Managing the Secure Development Process

When we started developing the platform which is the AppSec Flow today, our intentions were always to transform this in a central point where our clients could gather in one place not only data but also important information about their projects, auxiliating in our Secure Development Process. Nowadays we can, through Appsec Flow, gather in one platform all services that allow our clients to…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

Secure Development - Security in every pipeline

Nowadays we use the term “safe coding” or even “safe design” these terms are becoming more and more common among the creators of Secure development and Application Security. However, for this to be completely true in our development processes we need to truly understand this term’s concept, and how Application Security is connected to them.An article named, “A call to arms for…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application SecurityInfrastructure

Moving from DevOps to DevSecOps

Who should read this DevSecOps article? Whether your company produces or consumes software, understanding the best practices when moving from DevOps to DevSecOps is important to you. If your company does not operate any agile model or even DevOps practices, surely one of your suppliers uses this method in development. That’s a good reason for you to know more about each of them, and…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

Security Champion: you need to think about it

Security Champion and the battlefield There is an eternal battle inside your company: two of the most important areas are having conflicts for a very long time and it is necessary to end this. In companies that produce softwares it is common to have a dispute between two areas – Development & Security – To the development area, security teams are like a funnel for the…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

Why invest in AppSec Training

How can AppSec Training help? Aren’t you eager to know how training can help your company to reach maturity in Security Application Development? Training in Security is an investment that is not very fond of the organization. That is due to the lack of vision for results when analyzed in a short period of time scenario. In this article, we approach how Secure Development training can…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Infrastructure

Cloud Security: How Security is Affected

How secure is your data when it’s stored in the cloud? When it comes to Cloud Security, it is very common to believe that using a reputable server to store data online is enough to keep applications safe. Have you ever wondered if your business data is safe enough in the cloud? Of course, large companies that work with this type of service invest heavily in Cloud Security. But it…
Read more

How to increase the security of your container

Immutable Infrastructure in AppSec

Application SecurityInfrastructure

API Security: 6 main points

Have you ever stopped and evaluated the security of your APIs? In this article the approach is on how this resource has facilitated the implementation of solutions, bringing also some risks to application security. Get to know why it is important to evaluate API security, learn the main points that must be observed to keep them safe. API Security: why thinking of it? The adoption of…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development

Application Security

What Is Threat Modeling

Contextualization Why should we think on threat modeling? Well, during the software development process, some steps must be observed so the final result is truly a secure application and is able to reach all established requisites. New policies and normatives are being created so data owners will have the guarantee that their information is secured. Privacy has become an overrated therm…
Read more

Phishing scam using Conviso's name: don't fall for it!

Webinar: PIX and the Secure Development