AppCheck Security Blog

FEATURED POST

Webinar: XSS-Mas! …and a Hijacked New Year!

Appcheck - icons
In this blog post we aim to clarify the difference between each of the three terms, why knowledge of them is important for cybersecurity teams looking to optimise their security posture and deliver an efficient security programme that is best aligned with potential threats and most effective in reducing risk, and therefore potential harm, to their organisation.
Appcheck - icons
In this blog post, we take a look at why logging is important, what the “best practice” guidance is around configuring monitoring, and what risks and issues can occur if these practices are not followed.
Appcheck - icons
In this blog post we summarize some of the uses to which randomness can be put in computing – and cybersecurity especially – and investigate what pitfalls can occur when randomness is inappropriately sourced, generated or supplied in support of cybersecurity functions.
Appcheck - icons
In this blog post we look at what JSON Web Tokens are, how they are typically implemented, and what security concerns should be borne in mind when choosing to implement them within your own web applications.
Appcheck - icons
This blog post summarises AppCheck’s latest software releases for June 2023, from adding minor enhancements to the UI to enabling Multi-Factor Authentication for new accounts for added security, these updates collectively aim to improve user experience and streamline various tasks within the system.
Appcheck - icons
In this blog post, we take a look at how security software can become out of date and what risks that might post for an organisation if left unaddressed.

Get in touch

Start your free trial

Your details
IP Addresses
URLs