Web application security requires a multi-layered approach that considers and reduces all attack surfaces. Given the complexity of modern applications, overlooking even a small detail can leave an application vulnerable. Take the example of the Microsoft R...
Open-source software dramatically simplifies and speeds up the development process. However, it also carries significant risks in the form of vulnerabilities. The public nature of open-source code means that databases such as Open Source Vulnerabilities ...
Containers have emerged as a fantastic technology to deploy applications. Containers save a lot of time for system engineers dealing with infrastructure issues: servers, networks, operating systems (OS), ports, configuration, etc. If your application needs be...
We are pleased to announce the availability of the latest Kiuwan update! Released on July 22, 2020, this update includes several new features for administrators, described below. Kiuwan events and notifications We have programmed the generation of...
In their “Internet Crime Report 2023,” the FBI Internet Crime Complaint Center reported receiving 880,418 cybercrime reports, costing victims over $12.5 billion USD. This represents a more than 10% increase in incidents and a 17% increase in financial l...
Most developers don’t build applications from scratch. Instead, they use a mix of original development, code reused from other programs, and some third-party components. What often happens is that developers get deep into the weeds of making sure it all works...
DevSecOps is quickly becoming one of those trendy terms that everyone tries to use on social media. If you can somehow work #devsecops into a post, you’re using today’s forward-looking language. The problem is that many articles and blogs miss some of the mos...
Understanding the DevOps Approach to Code Security DevOps generally means integrating software development (dev) and information technology operations (ops) to speed the lifecycle, deliver better features, updates and fixes, and more. What’s sometimes missing...
This new age of Artificial Intelligence is fascinating—and terrifying, too. From ubiquitous digital assistants like Siri and Alexa to usage on factory floors, the impact of AI is dizzying. Your cell phone mostly features a voice assistant. At best, Apple’s Si...
We are pleased to announce that on June 3, 2020, Kiuwan released a new update! This release has many new features, including new rules for Java/JSP and C/C++, plus support for the latest version of Java. We have also added the option of auto-disabling account...
What DevSecOps Teams Can Learn from COVID-19 Over the last few months, the whole world has fundamentally changed due to the emergence of a novel coronavirus, COVID-19. The highly infectious nature of the virus, its devastating impact on vulnerable individuals...
Internet-of-things (IoT) devices are used in almost all industries for various use cases. Sensing what’s happening in the physical world and transmitting data wirelessly allows developers to collect, process, and analyze data for healthcare, manufacturing, ho...
App and software breaches can have lasting consequences. They also aren’t going anywhere. Finding vulnerabilities in your app and code early is critical. Maintaining strong security practices during and after development is essential to protecting your business.