Skip to content
Blog

Blog

  • Home
  • About
  • services
  • Contact

Creating secure applications for children

Secure applications

Designing an award-winning applications for children doesn’t just mean engaging graphics and interactive audiovisuals; in-built cyber security controls, and data protection is critical. When the COVID-19 global pandemic broke out, the whole world had to […]

Read more...
Entersoft TeamPosted on September 6, 2022September 7, 2022Categories Application Security, Application Security Guidelines

How to ensure data tokenization is truly secure

Data tokenization

Data is everywhere. Alongside technology, data tokenization is helping solve the most complex, diverse, and dynamic problems in finance, manufacturing, healthcare, education, climate change, sustainability, economic growth, and business resilience. Nowadays, there is no industry […]

Read more...
Entersoft TeamPosted on September 2, 2022September 2, 2022Categories Application Security

Does your organization really need a CASB? Here’s a quick guide

Cloud security access broker

Most organizations have CASB, as a consequence of Covid, migrated their entire application base from on-prem to cloud. They are also simultaneously migrating critical internal applications such as their CRM-based or HR modules to the […]

Read more...
Entersoft TeamPosted on August 29, 2022August 29, 2022Categories Application Security, Cloud Security1 Comment on Does your organization really need a CASB? Here’s a quick guide

Combating Risks Through Periodic Cybersecurity Audits

periodic cybersecurity audit

Evaluating your cybersecurity audits program on a regular basis is critical in helping to improve awareness of weak spots, vulnerabilities, and potential risks.  Cybersecurity capabilities continue to expand into uncharted waters, and compliance regulations follow […]

Read more...
Entersoft TeamPosted on August 24, 2022August 25, 2022Categories Application Security

An overview of the best cybersecurity certifications and institutes for young graduates and established experts

cybersecurirty career

A shortage of cybersecurity professionals makes now a great time to pursue a career in the space. If you’ve been considering a career in cybersecurity, there’s no time like the present. Whether you’re an acclaimed […]

Read more...
Entersoft TeamPosted on June 2, 2022June 2, 2022Categories Application Security, cyber security

OWASP Top 10 or OWASP ASVS – Fulfilling the need for robust software security systems

owasp top 10

The OWASP top 10 for 2021 is the most updated and most referred to list by cybersecurity professionals the world over. This data-driven compilation is a well-researched set of common vulnerabilities used by cyber attackers; […]

Read more...
Entersoft TeamPosted on May 30, 2022May 30, 2022Categories Application Security

Challenges in DevSecOps adoption and strategies to address them

devsecops

As cybersecurity and data protection becomes more critical, enterprises and start-ups are moving to DevSecOps to embed security controls end to end in the software development lifecycle (SDLC). Along the journey, there are challenges and […]

Read more...
Entersoft TeamPosted on May 24, 2022May 24, 2022Categories Application Security, Security Guidelines, vulnerability

Axie Infinity – Ronin Network loses $620m in the largest-ever crypto heist

nomad token b

Axie Infinity is the biggest gaming platform that rewards users for playing games. Ronin Network, which is also owned by Vietnamese parent company Sky Mavis, allows players to exchange the digital coins they earn in […]

Read more...
Entersoft TeamPosted on April 5, 2022April 5, 2022Categories Application Security, bitcoin, blockchain, cryptocurrency, cyber attack, ethereum

Testing cybersecurity resilience with Chaos Engineering

Chaos engineering principles, when applied to cybersecurity, can help build more dynamic, proactive and responsive security controls on-cloud $300,000 an hour. Unfortunately, this isn’t the salary of even the highest paid software engineer in the […]

Read more...
Entersoft TeamPosted on March 17, 2022March 17, 2022Categories Application Security

Application security for a secure enterprise

Remember when you clicked on a legitimate web application but were redirected to an entirely different site with malicious links? Then you have faced a very common web app vulnerability attack vector – a redirect […]

Read more...
Entersoft TeamPosted on March 4, 2022March 4, 2022Categories Application Security, Application Security Guidelines, Security Checklist, VAPT

Posts navigation

Previous page Page 1 Page 2 Page 3 … Page 12 Next page
  • Preparing a Strong Defence against Cyber Warfare amidst Growing Geopolitical Unrest
  • Dealing with the unprecedented rise of data breaches in India
  • Australia is under attack!
  • Phishing attacks – the biggest security threat to SMEs in the digital era
  • How do you evaluate an external cybersecurity vendor?
  • A guide to CIS Benchmarks
  • Withdrawing the Personal Data Protection Bill leaves Citizens Vulnerable
  • The Importance of Log Monitoring in Cybersecurity 
  • Application Security Orchestration and Correlation (ASOC) – The future of AppSec solutions
  • Data protection, data security, data privacy: Understanding the difference for better cybersecurity strategy planning

Loading

Copyright 2019
Entersoft Application Security
We collect data through cookies. Cookies are small pieces of information that are issued to your computer or any similar device you use to access the internet e.g. smartphone, tablet or other mobile devices when you visit a website and which store and sometimes track information about your use of the website. Please see our cookies policyCookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT
CONTACT US