Posts tagged “application security”



December 22, 2021, 12:00am

What is "Stored" Log4Shell ?

Alban Diquet
By Alban Diquet

Data Theorem

What is “Stored Log4Shell” and how is it different than the regular Log4Shell issue?



November 6, 2020, 12:00am

Mobile Apps and their SDKs

Himanshu Dwivedi
By Himanshu Dwivedi

Data Theorem

Learn about the risks involved with 3rd party SDKs, what data those SDKs might have access to, and steps you can take to have visibility into any possible leaky data or vulnerabilities.



October 16, 2020, 12:00pm

Securing the CI/CD pipeline in Pre-Production

Himanshu Dwivedi
By Himanshu Dwivedi

Data Theorem

A CI/CD pipeline automates your software delivery process. The pipeline builds code, runs tests (CI), and safely deploys a new version of the application (CD).

Automated pipelines remove manual errors, provide standardized feedback loops to developers, and enable fast product iterations to keep up with the modern pace of software development. This blog provides steps to automatically begin this in pre-production releases.



September 17, 2020, 3:00pm

Why Are APIs Important?

Felicia Haggarty
By Felicia Haggarty

Data Theorem

Before approaching API security, the biggest question we need to ask ourselves is “What is our process for discovering new or changed APIs or microservices? Can we comfortably say we know where all our APIs are?



September 8, 2020, 9:30am

Denied by Apple & Google

Himanshu Dwivedi
By Himanshu Dwivedi

Data Theorem

While app store blockers are not always a security issue, the delays can wreak havoc on your team's productivity and the success of your app.



March 31, 2020, 3:05pm

Ensuring Data Protection is Properly Enabled in Your iOS App

Phillip Tennen
By Phillip Tennen

Data Theorem

Learn some basic data protection tips to optimize your application security for your iOS app.



January 16, 2020, 12:00am

Proactive iOS App Security Measures for 2020

Phillip Tennen
By Phillip Tennen

Data Theorem

As we dive into the new year, here’s a brief list of essential security mechanisms that Apple offers to up the security of your iOS applications. Adopting these technologies and APIs within your products is an effective step towards writing more secure applications, giving you a lower risk of potential data compromise and increased confidence in your security posture.



November 21, 2019, 8:00am

Concerned About App Safety? 3 Tips for Protecting Privacy

Himanshu Dwivedi
By Himanshu Dwivedi

Data Theorem

Get tips and guidance for managing app security and how to keep data secure using common apps.

Everyday we read headlines about data breaches and data privacy, but how can we start being pro-active about managing data privacy in apps for us and our kids? We have some guidelines to share with you, as well as a quick demo to show you some tools you can use now for your kids and discuss how companies should be safeguarding data.



September 30, 2019, 12:00pm

Mobile App Security: App Store vs. Google Play

Himanshu Dwivedi
By Himanshu Dwivedi

Data Theorem

Are Google Play and Apple App Store offering false security? This blog offers a statistical comparison as well as some new perspectives on mobile security. There is a lot of hype around app removals from both app stores and A/V vendors (in the case of malware or spyware apps); however, what about legitimate apps used by the enterprise with low levels of security, or no security at all?



August 30, 2019, 9:30am

Serverless versus Containers: A Real-World Case Study of Building a Microservice

Alban Diquet
By Alban Diquet

Data Theorem

We determined that the best way to confirm or refute conventional wisdom was to put both serverless and container architectures to a head-to-head test.

In this blog, we'll present the results of this Serverless VS Containers experimentation. You will get an overview of what we discovered in terms of benefits and downsides of each technology, and how to deploy, use, and secure them in the context of a "real-world" application.



Security for DevOps: Enterprise Survey Report

ESG Analyst Report

ESG surveyed 371 IT and cybersecurity professionals with responsibility for cloud programs to weigh in on security.