Application Security

10-Reasons-to-Make-the-Switch-to-Forward-Security
10 Reasons to Make the Switch to Forward Security
Many of our clients (and prospective clients) are large firms in the fintech, health tech, and eCommerce sector who have…
10 Ways Eureka DevSecOps Platform Delivers Value
Eureka DevSecOps Platform can help you get the most value from your tools, better identify real security issues, and reduce…
Orchestrating & Correlating Your Security Scanners
If you’re using multiple automated security tools such as SAST, DAST, and SCA, and not correlating the results, then you…
Navigating IoT Innovations and Their Impact on Canadian Businesses 
The following is an excerpt from an interview from our Founder & CSO, Farshad Abasi and the Canadian Chamber of…
Penetration Testing: How Often Should You Test?
How often should I do penetration testing? It’s a question that comes up regularly. The short answer is: it depends. …
The Importance of a Risk Based Approach in Security Assessments
Suppose you run a security scan on your application, and it produces a report with a list of one hundred…
Case Study: Eureka DevSecOps Platform
The Background Our client in the data analytics sector had implemented DevOps automation and CI/CD pipelines but without any security…
What is Pentesting? (and What to Look for When Choosing a Service Provider)
You’ve probably heard of the term pentesting and wondered what it means. You've probably even had a pentest done and…
Does Your Application Need Security Requirements?
How do I make my application more secure? Where do I get security requirements from? Why do I need security…
What is Threat Modeling? (and Why is it Important for Applications?)
What is threat modeling and why is it important? A threat is something that has a negative impact on an…