Top 5 Java frameworks in 2022

Top 5 Java frameworks in 2022

Top 5 Java frameworks in 2022 Decades after its initial release, Java is still one of the most popular high-level, object-oriented programming languages out there. The language is designed to have as few dependencies as possible while simultaneously enabling...
Deserialization vulnerabilities in Java

Deserialization vulnerabilities in Java

Deserialization vulnerabilities in Java Understanding serialization and deserialization vulnerabilities is the first step toward building secure applications. For most developers, it’s a challenge to find the right balance between coding securely and meeting other...
Understanding the importance of vulnerability management

Understanding the importance of vulnerability management

The importance of vulnerability management Cybercriminals are constantly searching for security weaknesses so they can access your computer and your sensitive data, and the most common causes of these exploitations are software and network vulnerabilities. These...
Secure coding training for PCI DSS compliance

Secure coding training for PCI DSS compliance

Secure coding training for PCI DSS compliance Márk Félegyházi (CEO, Avatao) The financial industry, and more particularly the payment industry, handles a large amount of sensitive personal data. As such, it is no surprise that they were among the first to define...
Network compromised: Security Issues in Telecommunication

Network compromised: Security Issues in Telecommunication

Network compromised: Security Issues in Telecommunication Ábel Maróti (Junior Marketing Manager, Avatao) When it comes to communication between individuals and companies, telecommunications can’t be missed from the conversation. It impacts every person and business in...
Security Champions: Interview with Alexander Antukh, Glovo

Security Champions: Interview with Alexander Antukh, Glovo

Security Champions: Interview with Alexander Antukh, Glovo Security champions represent an essential part of any security programs. They lead their teams on security projects, ensure internal security and help keeping security on the top of your mind. But how exactly...