People want choices in how they access online services. They expect to be able to log into a website if they’re on their computer or download an app to their smartphone for convenience. Businesses today are responding to this demand for multichannel opt...
As software applications are increasingly integrated into more aspects of society, cyber threats continue to increase in complexity and frequency. The rapid digital shift brought about by the pandemic allowed people more convenience and flexibility by normali...
Despite widespread awareness of cybersecurity threats, the most common password in 2024 is still “123456.” This simple fact underscores the ongoing challenges in enforcing strong password practices. This is a serious problem, given that almost hal...
We are pleased to announce that on May 12, 2020, we rolled out a new Kiuwan release! We have made some changes in the way Kiuwan handles delivery analyses, we have added some REST API enhancements, and rolled out all of the latest changes to Kiuwan On-Premise...
Automatically Scan your Assembla Repository with Kiuwan Code Security Kiuwan can now be fully integrated within the Assembla software development platform! Make your securely stored code in the Assembla repository even more secure with the help of Kiuwan’s SA...
While we’ve discussed OWASP (Open Web Application Security Project), it’s importance to the security of applications and development and the standards it sets, there are other aspects that deserve our attention. One of the primary elements of OWASP that deman...
Blockchain is a viable data security solution across various industries, but is it secure? We understand blockchain’s ability to prevent cyber attacks lies in continuous improvements and advancements. Based on the latest developments, you must prac...
It’s not surprising to hear that e-commerce is booming, especially in our current state. It is even thought that by 2040, 95% of all purchases will be made online. Although buying online has become more commonplace, many are still unaware of the dangers they ...
In a globally connected environment where being the first to market provides an advantage that can be worth billions and persists for decades, taking the fastest route to product development is an operational necessity. For software development teams, th...
A Timeline of Major Data Breaches in 2019 If there’s no rest for the wicked, there seems to be also no rest for malicious cyber attackers. 2019 has had its fair share of data breaches and many of them have affected the data of millions of people. Let’s ...
Artificial intelligence (AI) is so ingrained in all aspects of modern society that the term is almost meaningless without further clarification. Developers have used AI technology for years to perform various tasks, such as auto-completing search results or r...
OWASP Top 10 for Mobile: All You Need to Know It’s not surprising to hear that with 45% of the world’s population owning a smartphone, attacks on mobile devices are on the rise. Every CISO or employee in cybersecurity has at least once heard of...
App and software breaches can have lasting consequences. They also aren’t going anywhere. Finding vulnerabilities in your app and code early is critical. Maintaining strong security practices during and after development is essential to protecting your business.