Don't miss out on any insight. Subscribe to stay in the loop about our exclusive content.
Don't miss out on any insight. Subscribe to stay in the loop about our exclusive content.
Blog
Importance of Security Audits in Software Projects for Robust Application Security
This article explores the vital role of implementing ASVS in software projects, highlighting its ...
Blog
Excellarate is now a valid SSAE 18 - SOC 2 Type 2 service provider
The Statement on Standards for Attestation Engagements 18 (SSAE 18) is a standard from the American ...
Blog
API Security: What it is and Why it Matters
Cybersecurity threats are on the rise in general and with APIs specifically. Because organizations ...
Blog
Open XDR and the Future of Cybersecurity
When “X” means everything. Aimei Wei is the Founder and VP of Engineering at Stellar Cyber. She has ...
Blog
The Future of the Data Revolution
Can data & privacy co-exist? Harrison Tang is Chief Executive Officer and Co-founder of Spokeo. ...
Blog
Building Secure Docker Images
Normally, when we begin to develop microservices and build our Docker images, we use Dockerfiles by ...
Blog
Why predictive analytics is key to achieving competitive advantage in insurance industry
Ask any insurance business; what’s toughest part of their operations, and you are most likely to ...
Blog
Increasing Chances of Cyber Attacks threaten the Financial Industry in 2019
Cybercrime groups keep up with their diligent efforts to infiltrate financial institutions and the ...
Blog
Centrally manage your AWS WAF rules setup
In the previous blog, we shared how you can secure your web applications, portals and API’s with ...
Blog
Web Application Security Using AWS WAF and AWS Shield
Estimated reading time: 6 minutes This post was last updated on 3 September 2019. As a modern ...
Blog
OWASP Top 10 Web Application Security Risks
As a continuation of our blog post on Securing Web Applications, here are the top 10 most critical ...