How do you uncover Hidden Risks in Web App? Cigniti Technologies2018-10-11T14:32:56+05:30Businesses are becoming increasingly concerned with the problem of infiltration into their apps by unauthorized persons. Every business, small or big, uses apps to provide better service to customers. When these apps are compromised by unauthorized code, the business loses credibility. How then can you protect your business apps [...] FacebookTwitterLinkedInEmail June 3, 2015 Read more...
Integrating Security into Continuous Testing Cigniti Technologies2018-10-11T14:28:21+05:30All of us understand and accept the necessity to have adequate security testing for our applications. The question we will delve into here is “is it possible to automate security testing as part of an application’s continuous integration cycle? If so, what are the benefits of doing so?” In an [...] FacebookTwitterLinkedInEmail May 19, 2015 Read more...
5 Ways to Build Mobile Apps that Users can Trust Cigniti Technologies2018-10-05T14:11:25+05:30Mobile apps have seen a steady rise in popularity with overall app usage up by 76% in 2014. The category of apps most popular among users are shopping apps and utility apps, both of which handle sensitive user data. An increased usage of apps increases the risk of malicious attacks. [...] FacebookTwitterLinkedInEmail April 10, 2015 Read more...
The Need of The Hour In Security Testing – Test Often And Test Right Cigniti Technologies2021-04-12T13:32:19+05:302015 has just started and already the Identity Theft Resource Center has reported 101 data breaches with over 80M records stolen. The US military Twitter account was recently hacked by terrorists. The Sony data breach is still fresh in our minds. And now millions of WordPress users who have [...] FacebookTwitterLinkedInEmail March 12, 2015 Read more...
Reliability & Security Will Be Key For Business Adoption Of Wearables Cigniti Technologies2018-10-11T14:54:42+05:30With the advent of BYOD (Bring your own device), enterprises are adding time and resources to ensure they can get the maximum benefit from the personal devices that employees bring to work. In fact, the BYOD market is supposed to reach an astounding $238.39 billion – a CAGR growth [...] FacebookTwitterLinkedInEmail March 6, 2015 Read more...
How safe is your mobile banking app? Cigniti Technologies2018-10-11T14:57:05+05:30Mobile banking brought about what is probably the biggest revolution in banking industry so far – the convenience of ‘banking on the go’. With the spread of smart phones, mobile banking increased in popularity, so much so that IDC expects mobile payments will exceed 1 trillion by 2017. But [...] FacebookTwitterLinkedInEmail February 6, 2015 Read more...
Banking Application Security and Impact of PCI DSS Compliance Cigniti Technologies2018-10-11T15:00:09+05:30Over 1 Million people across the world become victims of cyber crime daily with crimes occurring at the rate of 12 per second. Alarmed? You have every reason to be. Since the majority of data breaches relate to debit and credit cards, the PCI DSS standards were set in 2006 [...] FacebookTwitterLinkedInEmail January 23, 2015 Read more...
Securing on-premise data through data masking Cigniti Technologies2022-07-19T18:50:05+05:30Cloud computing has been growing in popularity over the years due to the several benefits it offers like higher scalability, flexibility and less infrastructure costs. At the same time, security has always been a prime concern, particularly in applications handling sensitive personal and commercial data. A study of 2200 [...] FacebookTwitterLinkedInEmail January 13, 2015 Read more...
8 Open Source Security Testing Tools To Test Your Website Cigniti Technologies2023-12-19T18:10:53+05:30If security incidents like Heartbleed, Apple gotofail flaw, and POODLE attack have taught us anything, web security cannot be taken lightly, and even the best of us are not safe from it. Web security testing tools are helpful in proactively detecting application vulnerabilities and safeguarding websites against attacks. Here are 8 popular [...] FacebookTwitterLinkedInEmail December 22, 2014 Read more...
The Internet’s Heartbleed: The unseen shadow that shattered the sense of data security through Heartbeat support since 2012 Ketan Sirigiri2018-10-11T15:16:45+05:30There is a devastating security vulnerability that was discovered in the OpenSSL implementation of the SSL/TLS protocol. For those who are not aware, TLS is a protocol that is commonly used to safeguard transactions on the web. Sometimes TLS is referred to as SSL and vice versa. Technically SSL [...] FacebookTwitterLinkedInEmail April 14, 2014 Read more...