Coding vs secure coding: 6 rules to live by

Coding vs secure coding: 6 rules to live by

Reading Time: 7 minutes Coding vs secure coding: 6 rules to live by 2020 resulted in the most severe healthcare industry data breaches to date. 616 data breaches of 500 or more records were reported to the HHS’ Office for Civil Rights. More than 28 million healthcare...
Secure coding training for PCI DSS compliance

Secure coding training for PCI DSS compliance

Reading Time: 7 minutes Secure coding training for PCI DSS compliance Márk Félegyházi (CEO, Avatao) The financial industry, and more particularly the payment industry, handles a large amount of sensitive personal data. As such, it is no surprise that they were among...
Sensitive data exposure – It’s in your hands

Sensitive data exposure – It’s in your hands

Reading Time: 8 minutes Sensitive data exposure – It’s in your hands Ábel Maróti (Junior Marketing Manager, Avatao) Exposing data, especially sensitive data, is a long-time-coming threat. Since personal information such as addresses, payment details,...
What’s next? – OWASP Top 10 2021

What’s next? – OWASP Top 10 2021

Reading Time: 9 minutes What’s Next? – OWASP Top 10 2021 Gábor Pék (Avatao CTO) Due to the urgent context changes in our work and life today, resilience and adoption were amongst our most essential attributes to utilize. One of the effects of these changes...
Broken Access Control

Broken Access Control

Reading Time: 7 minutes Broken Access Control Written by Márton Németh  In this article we cover examples of broken access control, how to find it in your application and possible consequences. Access control, or authorization, is how a web application grants...