Kiuwan logo

AppSec Blog

Keep up with the latest news on cybersecurity, technical trends, and programming best practices.

Recent Posts

Understanding Cyber Threat Intelligence (CTI)

Simply put, threat intelligence – also known as cyber threat intelligence, or CTI – is information that is collected, analyzed, organized, and refined to provide insight, input, and advice about potential and current security threats or attacks that could pos...

Understanding OWASP ASVS

Before open-source software (OSS) was commonplace, building applications was a tedious and time-consuming process. As it became more common to release code for community use, development time rapidly increased. Developers could build on previous work and didn...

Kiuwan Shines in the Fall 2020 G2 Grid Report

Kiuwan Shines in the Fall 2020 G2 Grid Report We’re excited to announce that Kiuwan Code Security and Insights solutions have been recognized in the Fall 2020 G2 Grid Report for Static Code Analysis, due in large part to an overall customer satisfaction ratin...
Fall 2020 G2 badge graphic

What Are Firmware Vulnerabilities?

Development tools are growing more advanced; large language models can now write code for us based on simple plain English requests. Unfortunately, malicious actors also have access to increasingly powerful tools. As a result, cybersecurity risk management ha...
Firmware vulnerabilities graphic

October Is Cybersecurity Awareness Month

October is Cybersecurity Awareness Month. The theme for 2020 is: “Do Your Part. Be #CyberSmart.”  This event, put on by CISA and the National Cyber Security Alliance, is in its seventeenth year. The campaign aims to increase overall cybersecurity aw...
Cybersecurity awareness month graphic

Using the Principle of Least Privilege for Web Apps

With an ever-increasing proportion of day-to-day work on the desktop occurring in the form of web-based applications, organizations need to rethink how those applications work. They also need to examine – and in some cases tighten up – how web-based apps (or ...
Web apps graphic

How Automation Can Fix Bad Development Habits

Amidst growing cybersecurity threats, the security of the software we write has taken increased importance. To help prevent cyber attacks, DevSecOps has become standard practice among many development teams.  One of the most powerful tools in DevSecOps i...
fixing bad development habits graphic

Strategies for Managing Widely Deployed Code with Kiuwan

As applications become increasingly cloud-based – or even, cloud-native – more and more such code is sending data to and from cloud-based stores, both public and private. This makes the methods and controls that such applications use to access the cloud of pa...

See Kiuwan in Action

App and software breaches can have lasting consequences. They also aren’t going anywhere. Finding vulnerabilities in your app and code early is critical. Maintaining strong security practices during and after development is essential to protecting your business.
© 2024 Kiuwan. All Rights Reserved.