Blog

Keep up with tips, news, and trends from Data Theorem engineers, customers, partners, support team members, and executives.

November 21, 2019, 8:00am

Concerned About App Safety? 3 Tips for Protecting Privacy

Himanshu Dwivedi
By Himanshu Dwivedi
CEO
Data Theorem

Get tips and guidance for managing app security and how to keep data secure using common apps.

Everyday we read headlines about data breaches and data privacy, but how can we start being pro-active about managing data privacy in apps for us and our kids? We have some guidelines to share with you, as well as a quick demo to show you some tools you can use now for your kids and discuss how companies should be safeguarding data.



October 31, 2019, 11:00am

Lessons From the Trenches: Mobile AppSec Program

Felicia Haggarty
By Felicia Haggarty
Director
Data Theorem

When beginning a mobile appsec program, there are several metrics you establish to define success in the first six months, one year and beyond. What is less mentioned is the human element to creating a successful program and changing the internal security and devops culture on the road to a devsecops approach.

This customer would like to remain anonymous, but shares valuable tips for how they approached their appsec program in a large company, with a large number of apps available to their customers, and many teams that have to interact in order to achieve 100% Data Theorem protection.



September 30, 2019, 12:00pm

Mobile App Security: App Store vs. Google Play

Himanshu Dwivedi
By Himanshu Dwivedi
CEO
Data Theorem

Are Google Play and Apple App Store offering false security? This blog offers a statistical comparison as well as some new perspectives on mobile security. There is a lot of hype around app removals from both app stores and A/V vendors (in the case of malware or spyware apps); however, what about legitimate apps used by the enterprise with low levels of security, or no security at all?



August 30, 2019, 9:30am

Serverless versus Containers: A Real-World Case Study of Building a Microservice

Alban Diquet
By Alban Diquet
Head of Engineering
Data Theorem

We determined that the best way to confirm or refute conventional wisdom was to put both serverless and container architectures to a head-to-head test.

In this blog, we'll present the results of this Serverless VS Containers experimentation. You will get an overview of what we discovered in terms of benefits and downsides of each technology, and how to deploy, use, and secure them in the context of a "real-world" application.



Security for DevOps: Enterprise Survey Report

ESG Analyst Report

ESG surveyed 371 IT and cybersecurity professionals with responsibility for cloud programs to weigh in on security.