Security breaches then and now

Security breaches then and now

Reading Time: 10 minutes Security breaches then and now Security Breaches Today Whether you are a warehouse worker using scanners to track packages or a c-suite executive heading technology development, odds are you work with at least one software each day. This...
Coding vs secure coding: 6 rules to live by

Coding vs secure coding: 6 rules to live by

Reading Time: 7 minutes Coding vs secure coding: 6 rules to live by 2020 resulted in the most severe healthcare industry data breaches to date. 616 data breaches of 500 or more records were reported to the HHS’ Office for Civil Rights. More than 28 million healthcare...
Secure coding training for PCI DSS compliance

Secure coding training for PCI DSS compliance

Reading Time: 7 minutes Secure coding training for PCI DSS compliance Márk Félegyházi (CEO, Avatao) The financial industry, and more particularly the payment industry, handles a large amount of sensitive personal data. As such, it is no surprise that they were among...
Most common software vulnerabilities during COVID-19

Most common software vulnerabilities during COVID-19

Reading Time: 8 minutes Most common software vulnerabilities during COVID-19  In December 2020, 71% of the US workforce was working from home. WFH culture placed a new importance on cybersecurity, as it allowed an unprecedented opportunity for cybercriminals to...
Sensitive data exposure – It’s in your hands

Sensitive data exposure – It’s in your hands

Reading Time: 8 minutes Sensitive data exposure – It’s in your hands Ábel Maróti (Junior Marketing Manager, Avatao) Exposing data, especially sensitive data, is a long-time-coming threat. Since personal information such as addresses, payment details,...