A CI/CD pipeline automates your software delivery process. The pipeline builds code, runs tests (CI), and safely deploys a new version of the application (CD).
Automated pipelines remove manual errors, provide standardized feedback loops to developers, and enable fast product iterations to keep up with the modern pace of software development. This blog provides steps to automatically begin this in pre-production releases.
Before approaching API security, the biggest question we need to ask ourselves is “What is our process for discovering new or changed APIs or microservices? Can we comfortably say we know where all our APIs are?
While app store blockers are not always a security issue, the delays can wreak havoc on your team's productivity and the success of your app.
Learn some basic data protection tips to optimize your application security for your iOS app.
As we dive into the new year, here’s a brief list of essential security mechanisms that Apple offers to up the security of your iOS applications. Adopting these technologies and APIs within your products is an effective step towards writing more secure applications, giving you a lower risk of potential data compromise and increased confidence in your security posture.
Get tips and guidance for managing app security and how to keep data secure using common apps.
Everyday we read headlines about data breaches and data privacy, but how can we start being pro-active about managing data privacy in apps for us and our kids? We have some guidelines to share with you, as well as a quick demo to show you some tools you can use now for your kids and discuss how companies should be safeguarding data.
When beginning a mobile appsec program, there are several metrics you establish to define success in the first six months, one year and beyond. What is less mentioned is the human element to creating a successful program and changing the internal security and devops culture on the road to a devsecops approach.
This customer would like to remain anonymous, but shares valuable tips for how they approached their appsec program in a large company, with a large number of apps available to their customers, and many teams that have to interact in order to achieve 100% Data Theorem protection.
Are Google Play and Apple App Store offering false security? This blog offers a statistical comparison as well as some new perspectives on mobile security. There is a lot of hype around app removals from both app stores and A/V vendors (in the case of malware or spyware apps); however, what about legitimate apps used by the enterprise with low levels of security, or no security at all?