While we’ve discussed OWASP (Open Web Application Security Project), it’s importance to the security of applications and development and the standards it sets, there are other aspects that deserve our attention. One of the primary elements of OWASP that deman...
Blockchain is a viable data security solution across various industries, but is it secure? We understand blockchain’s ability to prevent cyber attacks lies in continuous improvements and advancements. Based on the latest developments, you must prac...
Artificial intelligence (AI) is so ingrained in all aspects of modern society that the term is almost meaningless without further clarification. Developers have used AI technology for years to perform various tasks, such as auto-completing search results or r...
OWASP Top 10 for Mobile: All You Need to Know It’s not surprising to hear that with 45% of the world’s population owning a smartphone, attacks on mobile devices are on the rise. Every CISO or employee in cybersecurity has at least once heard of...
There’s never a day that any organization can let its guard down regarding cybersecurity. A proactive approach to improving your security posture is the best way to avoid new and evolving attacks. In addition to checking for vulnerabilities at different point...
There’s a reason so many organizations are changing their approach to security. Data breaches cost organizations an average of $4.5 million. The old approach, where developers built their code and left worries about testing to the later phases, wasn’t wo...
Kiuwan provides SAST and SCA solutions that use an on-premise standalone Java application for the scanning of source code, then sends the results file to the Kiuwan cloud for augmentation and additional analysis. This Java scanner is calle...
Application security testing (AST) requires a comprehensive approach that can catch modern, sophisticated threats from multiple angles and covers all attack surfaces. Unfortunately, you can’t mount such a multi-tiered defense with only one tool. You’ll need d...
Food for Thought: On-premises Goes Hybrid Using application security testing (AST) tools has many benefits; for example increasing the speed, efficiency and coverage paths for testing applications. However, there are many reasons why individuals may feel inse...
There are three phases of defending against cyber attacks: putting in place sufficient protections and robust authentication mechanisms to try and prevent attacks; appropriately defending against an active attack once it is discovered, and communicating accur...
Over the past two decades, DevOps processes have successfully sped up the app development lifecycle and reduced the complexity and workload for software engineers. However, following the initial market boom, security and privacy were two of the most neglected...
How much can a data security breaches really cost a company? What is the cost of a few infiltrated databases and stolen customer account information? The answer ranges between millions and billions of dollars in damages paid to those whose informati...
App and software breaches can have lasting consequences. They also aren’t going anywhere. Finding vulnerabilities in your app and code early is critical. Maintaining strong security practices during and after development is essential to protecting your business.