Intro to XXE Vulnerabilities: AppSec Simplified

Protect your XML parsers against malicious XML documents!
Photo by Jason Leung on Unsplash
Hey! And welcome to the first installment of AppSec Simplified. Today, we are going to explore a fascinating vulnerability called XML External Entity vulnerabili… Continue reading Intro to XXE Vulnerabilities: AppSec Simplified

5 Reasons Why Mobile Application Security Fails

Traditionally, large organizations and the enterprise have been the focus for hackers and malicious attacks, but in recent years, the rise of sophisticated hacking tools and leaked databases on the dark web, in conjunction with the proliferation of mo… Continue reading 5 Reasons Why Mobile Application Security Fails

Enso Previews Application Security Posture Management Platform

Enso Security today previewed an application security posture management (ASPM) platform that makes it easier for cybersecurity teams to discover applications, identify owners and detect changes. Fresh off raising $6 million in funding, Enso Security … Continue reading Enso Previews Application Security Posture Management Platform

All You Need to Know About HIPAA Requirements

Understanding HIPAA compliance is a requirement in developing a healthcare app for the U.S. market When developing a healthcare app, you need to consider data protection. In 1996, the U.S. government enacted the Health Insurance Portability and Accoun… Continue reading All You Need to Know About HIPAA Requirements

Amazon Honeycode Brings No Code Application Development to AWS


No code application building has long been the Holy Grail of app development. The idea behind no code development is to simplify the application development process to bring it within the capability of regular business users. No code development tools promise to reduce the complexity and costs of the application development process as well as […]

The post Amazon Honeycode Brings No Code Application Development to AWS appeared first on Petri.

Continue reading Amazon Honeycode Brings No Code Application Development to AWS

Eye on the End User: Application Layer Security

The application layer is where users interact with your apps, so its security should be paramount. Here are a few considerations Securing applications can be a struggle at the best of times. Today, developers need to ensure that every level of their a… Continue reading Eye on the End User: Application Layer Security

Orca Security Raises $20M to Secure Cloud Platforms

Orca Security has raised an additional $20 million in funding to drive adoption of an approach to discovering cloud security issues using agent software. Company CEO Avi Shua said the Orca Security platform looks for issues including vulnerabilities, m… Continue reading Orca Security Raises $20M to Secure Cloud Platforms

Are Current Security Assurance Models Suitable for the Digital World?

A proactive security assurance model is a key enabler for delivering an effective operating model that encompasses the protection of people, processes and technology.

The post Are Current Security Assurance Models Suitable for the Digital World? appeared first on Security Intelligence.

Continue reading Are Current Security Assurance Models Suitable for the Digital World?

COVID-19 Contact Tracing: Your Privacy for Your Health?

We continually hear of the need for COVID-19 contact tracing. But what exactly is contact tracing? The U.S. Centers for Disease Control (CDC) published guidance on contact tracing during the 2006 Ebola epidemic. In that guide, it explained how tracing… Continue reading COVID-19 Contact Tracing: Your Privacy for Your Health?

Why Traditional Security Is Failing Us, Part 2

This is the second part of a two-part series that explores the reasons behind the failure of security technologies to protect companies and their data from emerging threats in the age of cloud, connected devices and an ever-expanding threat surface. I… Continue reading Why Traditional Security Is Failing Us, Part 2