Avatao Blog

Cybersecurity best practices, tips, and the latest news discussed by security professionals.
Read on to find the topic that interests you the most!

Featured article

Security breaches then and now

Security breaches then and now

Reading Time: 10 minutes The increasing threat of security breaches mostly has to do with the increasing amount of information being stored. Although individuals are responsible for most data creation, 80% of all data is stored by enterprises.

Browse by category

owasp
appsec
devsecops
interviews
secure coding
it security

Latest posts

Security breaches then and now

Security breaches then and now

Reading Time: 10 minutes The increasing threat of security breaches mostly has to do with the increasing amount of information being stored. Although individuals are responsible for most data creation, 80% of all data is stored by enterprises.

Coding vs secure coding: 6 rules to live by

Coding vs secure coding: 6 rules to live by

Reading Time: 7 minutes Security breaches can impact any organisation. Insecure coding practices may result in increased security risk, and put businesses in jeopardy. Click to read our post about 6 secure coding rules to live by!

Secure coding training for PCI DSS compliance

Secure coding training for PCI DSS compliance

Reading Time: 7 minutes In payment transactions, security is critical, and any weakness does not only compromise the data, but can result in credit card fraud that causes huge losses for the stakeholders.

Sensitive data exposure – It’s in your hands

Sensitive data exposure – It’s in your hands

Reading Time: 8 minutes Exposing data, especially sensitive data, is a long-time-coming threat. Since personal information such as addresses, payment details, non-hashed passwords, config files, and so on are very popular targets among attackers, it’s obvious that sensitive information is supposed to be protected from unauthorized access.

Test your secure coding skills with Avatao