AppCheck Security Blog

FEATURED POST

When Encryption Goes Bad

Appcheck - icons
If you think you would benefit from understanding how hackers are actively exploiting web applications and APIs today, including hacking demonstrations, prevention techniques, a review of the latest hacks, and a detailed overview of the vulnerability threat landscape, please respond today to secure your seats. (We’ll also take a sneak peek into the benefits, challenges, and recommendations for automated security testing of complex Web Applications and APIs)
Appcheck - icons
This blog post summarises AppCheck’s latest software releases for July 2023. These changes are paving the way for a more asset-centric approach, aligning with our goal of providing you with even better insights and services.
Appcheck - icons
In this blog post we aim to clarify the difference between each of the three terms, why knowledge of them is important for cybersecurity teams looking to optimise their security posture and deliver an efficient security programme that is best aligned with potential threats and most effective in reducing risk, and therefore potential harm, to their organisation.
Appcheck - icons
In this blog post, we take a look at why logging is important, what the “best practice” guidance is around configuring monitoring, and what risks and issues can occur if these practices are not followed.
Appcheck - icons
In this blog post we summarize some of the uses to which randomness can be put in computing – and cybersecurity especially – and investigate what pitfalls can occur when randomness is inappropriately sourced, generated or supplied in support of cybersecurity functions.
Appcheck - icons
In this blog post we look at what JSON Web Tokens are, how they are typically implemented, and what security concerns should be borne in mind when choosing to implement them within your own web applications.

Get in touch

Start your free trial

Your details
IP Addresses
URLs