Vulnerabilities in authentication and authorization

Vulnerabilities in authentication and authorization

Vulnerabilities in authentication and authorization Authentication vs authorization Most people don’t fully understand the difference between authentication and authorization and regularly use them interchangeably, despite having fundamentally different functions....
Top Cybersecurity Threats in 2021

Top Cybersecurity Threats in 2021

Top cybersecurity threats in 2021 2021 is coming to a close, and it’s time to take stock of the security lessons we’ve all learned this year. This is the only way we can understand the types of security threats we’ll face next year. When it comes to...
The Media Markt attack: Dangers of ransomware

The Media Markt attack: Dangers of ransomware

The Media Markt attack: Dangers of ransomware Ábel Maróti (Junior Marketing Manager, Avatao) As the holiday season approaches, both online and offline sales are increasing, putting more and more pressure on retailers. Black Friday is right around the corner, promising...
Coding vs secure coding: 6 rules to live by

Coding vs secure coding: 6 rules to live by

Coding vs secure coding:6 rules to live by 2020 resulted in the most severe healthcare industry data breaches to date. 616 data breaches of 500 or more records were reported to the HHS’ Office for Civil Rights. More than 28 million healthcare records were exposed,...
Secure coding training for PCI DSS compliance

Secure coding training for PCI DSS compliance

Secure coding training for PCI DSS compliance Márk Félegyházi (CEO, Avatao) The financial industry, and more particularly the payment industry, handles a large amount of sensitive personal data. As such, it is no surprise that they were among the first to define...
Sensitive data exposure – It’s in your hands

Sensitive data exposure – It’s in your hands

Sensitive data exposure – It’s in your hands Ábel Maróti (Junior Marketing Manager, Avatao) Exposing data, especially sensitive data, is a long-time-coming threat. Since personal information such as addresses, payment details, non-hashed passwords, config...