• Are your developers aware about how to fix vulnerabilites in the code?

    Are your developers aware about how to fix vulnerabilites in the code?

  •  Is your management aware of cyber security risks?

    Is your management aware of cyber security risks?

  • Do you know which vulnerabilities have most impact to your business?

    Do you know which vulnerabilities have most impact to your business?

  • Are you verifying the JavaScript Code you are developing?

    Are you verifying the JavaScript Code you are developing?

  • Are the online transactions of my service under attack?

    Are the online transactions of my service under attack?

  • Are my outsourcers developing Secure Software?

    Are my outsourcers developing Secure Software?

  • Are my Internet facing applications secure?

    Are my Internet facing applications secure?

  • Is your company aware of cyber security risks?

    Is your company aware of cyber security risks?

  • Are you reviewing in depth your business critical application?

    Are you reviewing in depth your business critical application?

  • Are you reviewing in depth your mobile applications?

    Are you reviewing in depth your mobile applications?

  • Have you got a set of secure coding guidelines for all your technologies?

    Have you got a set of secure coding guidelines for all your technologies?

  • Minded Security Webinar

    Minded Security Webinar

3.100.000

end users protected

1000M

dynamic web pages scanned

17

Achieved Countries

Latest news from our blog

Antitamper Mobile - Minded Security's Magik Quadrant for Mobile Code Protection

Minded Security's Magik Quadrant for Mobile Code Protection shows you our evaluation of the top vendors in this market, based on our research and experience.Magik Quadrant...

Posted on Wednesday April 29, 2015

Beyond Superfish: a Journey on SSL MitM in the Wild

Recently Lenovo hit the news because they got caught installing adware on their laptops, namely Superfish, ...

Posted on Thursday April 09, 2015

Exploiting CVE-2011-2461 on google.com

As a follow up of our Troopers 2015 presentation about CVE-2011-2461 we want to release more details about a real world exploitation scenario targeting Google services.During our large-scale an...

Posted on Monday March 30, 2015