“The data you’re working with is probably as important as the platform you’re working on,” says Randy Potter, chief architect at consultancy Capgemini Americas. “If you look at the big vendors, they’re very security-conscious, so you can follow their lead and leverage what they’re doing in terms of security. I do think you have to be very careful about visibility and transparency — lifting the hood and looking underneath it so you can make specific adjustments and monitor and control.”
However, attackers never sleep. with new ways to compromise applications and platforms. This requires platform providers to be vigilant and proactive about the security of both the platforms themselves and the applications built on them. For example, Battles says the platform he uses flags issues in the code and even blocks deployments to ensure code quality and security.
However, if an attacker does manage to penetrate kenya mobile database of the low-code/no-code platforms, how will he be able to do this?
“There are two scenarios here. You’re building an app that exposes too much data, so it’s vulnerable to a data leak, although the bigger risk is that an attacker might find a problem in the platform itself,” says Matias Madu, CTO of secure coding platform Secure Code Warrior. “If you’re a developer, you’re under pressure to deliver the functionality you need, so I think the best way forward is to be more proactive about quality, including security aspects.”