Low-Code SDLC – Build Fast, Stay Secure Permalink
Low-code application development provides a solution for a wide range of business needs, from business applications through process automation and integratio...
Low-code application development provides a solution for a wide range of business needs, from business applications through process automation and integratio...
Last year, Microsoft’s Detection and Response Team (DART) published the timeline of an attack which leveraged Power Platform, Microsoft’s low-code platform. ...
Clear examples of why low-code / no-code is so cool.
Seven significant security risks in low-code development, such as insecure authentication and data leakage plus practical advice for mitigating these vulnera...
In late August 2021, a data leak exposed 38 million private records via Microsoft’s Power Apps portals. Discovered by UpGuard, this misconfiguration is one o...
The danger of anyone being able to spin up new applications is that few are thinking about security. Here’s why everyone is responsible for the security of l...
IT departments must account for the business impact and security risks such applications introduce.
To see why low-code/no-code is inevitable, we need to first understand how it finds its way into the enterprise.
Despite Microsoft’s efforts to enhance security features, the Zenity research team found that Power Pages is still prone to security risks due to misconfigur...
Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.
Zenity research team discovers a vulnerability in Zapier’s storage solution that exposes sensitive customer data. Despite Zapier’s efforts to mitigate the is...
How a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.
Low/no-code tools allow citizen developers to design creative solutions to address immediate problems, but without sufficient training and oversight, the tec...
Hackers can use Microsoft’s Power Automate to push out ransomware and key loggers—if they get machine access first.
In the middle of March 2022, Zenity research team discovered a sandbox-escape vulnerability in Code by Zapier, a service used by Zapier to execute custom cod...
This document is the vulnerability disclosure report once the vulnerability was discovered.
Many enterprise applications are built outside of IT, but we still treat the platforms they’re built with as point solutions.
Security teams that embrace low-code/no-code can change the security mindset of business users.
Here’s what that means about our current state as an industry, and why we should be happy about it.
Large vendors are commoditizing capabilities that claim to provide absolute security guarantees backed up by formal verification. How significant are these p...
Here’s how a security team can present itself to citizen developers as a valuable resource rather than a bureaucratic roadblock.
What’s scarier than keeping all of your passwords in one place and having that place raided by hackers? Maybe reusing insecure passwords.
No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.
How can we build security back into software development in a low-code/no-code environment?
With the introduction of generative AI, even more business users are going to create low-code/no-code applications. Prepare to protect them.
AI-generated code promises quicker fixes for vulnerabilities, but ultimately developers and security teams must balance competing interests.
A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections.
A login, a PA trial license, and some good old hacking are all that’s needed to nab SQL databases
Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — despite the risks associated with public...
Enterprises need to create a secure structure for tracking, assessing, and monitoring their growing stable of AI business apps.
Business users are building Copilots and GPTs with enterprise data. What can security teams do about it?
The tantalizing promise of true artificial intelligence, or at least decent machine learning, has whipped into a gallop large organizations not built for spe...
Security for AI is the Next Big Thing! Too bad no one knows what any of that really means.
Much like an airplane’s dashboard, configurations are the way we control cloud applications and SaaS tools. It’s also the entry point for too many security t...
AppSec is hard for traditional software development, let alone citizen developers. So how did two people resolve 70,000 vulnerabilities in three months?
AI jailbreaks are not vulnerabilities; they are expected behavior.
The tangle of user-built tools is formidable to manage, but it can lead to a greater understanding of real-world business needs.
While low-code/no-code tools can speed up application development, sometimes it’s worth taking a slower approach for a safer product.