Library
Explore a collection of educational content from our security experts
The Importance of “Baking” Security Into Your Applications
Historically, security has been enforced outside of the application, particularly at the edge of the network where traffic flows across trusted and untrusted network segments. This is accomplished by using various tools such as network or application specific...
Embedding Security Into Software During Development
Security has traditionally been focused at the infrastructure level, particularly at the edge of the network where traffic flows across trusted and untrusted network segments. This is accomplished by using various tools such as network or application specific...
Application Security for Busy Tech Execs
We have created this series to help busy technology executives like you navigate through the cloudy and often poorly understood field of application security and array of options out there. In this series we will discuss some of the key pillars of application security in 1-2 min video capsules to save you time and help make the best decision.
Forward Security is now an AWS Select Consulting Partner
Forward Security Inc., a North American company with offices in Vancouver, Toronto and Austin, TX specializing in application & cloud security consulting, is proud to announce that it has earned the Select tier Consulting Partner designation from Amazon Web...
SAST, SCA, DAST, IAST, RASP: What They Are and How You Can Automate Application Security
A pplication security is an ongoing challenge throughout the entire software development life cycle (SDLC). Today, more and more development teams are shifting to Agile and DevOps SDLCs to rapidly build application to meet the rising demands from the business and...
Biden’s Executive Order Impact on Application & Cloud Security
P resident Joe Biden’s new executive order takes important steps to bringing awareness to security for organizations when developing software. With 52% of breaches caused by malicious attacks against applications in 2020, the changes mentioned in the executive order...
Why ASVS Is The Gold Standard For Application Security
According to Contrast Security’s 2020 Application Security Observation Report, 96% of web apps have at least one vulnerability, and 26% of those are serious. The continued proliferation of application vulnerabilities confirms that development teams are not certain...
Securing Modern API and Microservices-Based Apps by Design – Part 2
Combine existing security concepts and best practices together and design more secure distributed applications. Introduction Part 1 of this two-part series discussed what services and microservices are, the role of APIs...
Securing Modern API and Microservices-Based Apps by Design – Part 1
Combine existing security concepts and best practices together and design more secure distributed applications. Introduction A common approach to modernizing applications is to use APIs and decompose them into smaller...
Talk with us
Get in touch to book a complimentary security consultation