Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Low Code

Low Code Application Security Best Practices and Strategies

Developing applications using low code platforms has gained popularity in recent years due to its ability to accelerate the software development process. However, with increased speed and efficiency comes the need for robust security measures to protect sensitive data and ensure a safe user experience. In this article, we will explore the best practices and strategies for enhancing low code application security.

The Importance of Low Code Security in Today's Digital Landscape

In today’s rapidly evolving digital landscape, the importance of low code security cannot be overstated. As organizations increasingly rely on low code development platforms to accelerate application and software development, it is crucial to understand the significance of robust security measures.

Cybersecurity in the Low-Code Age: Emerging Threats and Protective Strategies

Low-code platforms have become a transformative force in the dynamic world of software development. They’ve democratized the designing, building, and deployment of software, which has had a ripple effect across entire industries. Today, with minimal coding expertise, users can craft innovative applications tailored to meet the needs of consumers and businesses alike. But the allure of low-code simplicity also creates a challenge.

No-code vs. low-code and near-no-code security automation

It seems that “no-code” is a term we hear more often in the security automation context these days. And this is especially true because automation has become one of the major talking points in cybersecurity. How is no-code automation implemented in cybersecurity? How do no-code and Sumo Logic automation compare to each other? We’ll discuss all these questions in the following sections.

Unlocking Supply Chain Transparency for Low-Code/No-Code Apps with SBOM

The world of software development has witnessed a significant transformation thanks to low-code/no-code development platforms like Microsoft Power Platform, Salesforce, and ServiceNow. These platforms have empowered developers and business users of all technical backgrounds to create applications, automations, bots, connections (and more), rapidly and with greater accessibility.

Securing my LCNC - Where to Start?

When working with security teams and application security analysts, the new world of low-code/no-code development presents new questions that invariably begin with ‘where do we start?’ With so many new applications, automations, and more that are introduced to the corporate environment, it can seem like an endless pit of concerns about data flows, user permissions and potential security risks introducing my organization that need to be analyzed and brought under management.

Leveraging Low-Code Platform Integrations for Effective Business Automation

In the dynamic world of business, the quest for streamlined operations and increased efficiency is constant. One of the key tools that have gained considerable attention in recent years is the use of low-code platforms. These platforms offer a simplified approach to programming, making it easier for a wider range of individuals within a company to contribute to the digital transformation process. A notable leader in this space is Latenode.

An Explainer for how AI and Low-Code/No-Code are Friends, not Foes

In today’s rapidly evolving digital landscape, organizations not only seek out, but need to harness the power of emerging technologies to stay ahead of the competition. Two of the most promising trends in the tech world are generative AI and low-code/no-code development. Generative AI, in particular, has generated the majority of the headlines, with seemingly infinite use cases to spur productivity for end users and business.

The Power of Low-Code/No-Code Development in Changing Application Development Landscape

The landscape of application development is constantly evolving, driven by technological advancements and changing user demands. Over the past few years, we have witnessed the rise of generative AI, the “shift left” approach, and the increasing prominence of low-code/no-code development.

Security Insights on the Low-Code / No-Code Attack Vector

The August 4th compromise of Twilio via a targeted smishing attack has been a topic of wide concern and discussion on social media. My first thoughts on hearing of the attack were to virtually “pat myself down” with regard to exposure risk. Kind of like that feeling when you’re not sure if your car keys or wallet are in your pocket a few blocks after walking away from your parking space. Is my company affected by the breach? Did we receive a notification email from them?