35 Search results for:
See all Current Events Events Product Research Security
Andrew Silberman

Low Code Application Security Best Practices and Strategies

Developing applications using low code platforms has gained popularity in recent years due to its ability to accelerate the software…
Security
Andrew Silberman

The Importance of Low Code Security in Today’s Digital Landscape

In today’s rapidly evolving digital landscape, the importance of low code security cannot be overstated. As organizations increasingly…
Security
Josh Bernstein

Cybersecurity in the Low-Code Age: Emerging Threats and Protective Strategies

Uncover low-code cybersecurity strategies & stay ahead of threats with Zenity.io. Empower your development securely today!
Security
Andrew Silberman

What a Vulnerability in Salesforce Apex Code Means for You

The obfuscated nature of custom Apex code that is used in internal Salesforce instances and apps (i.e. Lightning, Lightning Communities)…
Research Security
Andrew Silberman

Making Sense of AI in Cybersecurity

Unless you have been living under a rock, you have seen, heard, and interacted with Generative AI in the workplace. To boot, nearly every…
Security
Andrew Silberman

Microsoft Copilot Studio Vulnerabilities: Explained

Last week, Michael Bargury and the team at Zenity published a video summarizing 6 vulnerabilities that are found in Microsoft Copilot…
Security
Ziv Daniel Hagbi

The Rise of Generative AI in Citizen Development (and Cybersecurity Challenges That Come With It)

Introduction Citizen developers, often without a formal background in programming, are harnessing the power of generative AI capabilities to…
Security
Andrew Silberman

Navigating the Cybersecurity Challenges of Citizen Development in Healthcare

Introduction In an era of rapid technological advancements, healthcare organizations are always looking for ways to become more productive…
Security
Yuval Adler

Taking Power Platform Security and Governance from 0 to 60: Part 3

Welcome back to the final part of my blog series on taking Power Platform security and governance to the next level. In Part 2 (which you…
Security
Yuval Adler

Taking Power Platform Security and Governance from 0 to 60: Part 2

Recap of Part 1 In the first part of this blog series, we explored the foundational steps required to kickstart a robust security program…
Security
Yuval Adler

Taking Power Platform Security and Governance from 0 to 60: Part 1

Introduction Welcome to the first installment of my three-part blog series on securing low-code/no-code development within the Microsoft…
Security
Yuval Adler

Securing my LCNC – Where to Start?

When working with security teams and application security analysts, the new world of low-code/no-code development presents new questions…
Security
Load More