There’s a reason so many organizations are changing their approach to security. Data breaches cost organizations an average of $4.5 million. The old approach, where developers built their code and left worries about testing to the later phases, wasn’t wo...
The latest Kiuwan release includes a new CQM model and two new checkpoints to allow using the Life Cycle module together with Insights. Keeping up with the times Go The new CQM model 2.5.0 includes 56 new rules supporting the popular programming la...
Kiuwan provides SAST and SCA solutions that use an on-premise standalone Java application for the scanning of source code, then sends the results file to the Kiuwan cloud for augmentation and additional analysis. This Java scanner is calle...
On February 13 we released support for a new programming language: Go (aka Golang). We have added 56 new security rules for Go in our default analysis model (CQM). Visit our Change Log for an explanation on how to view these rul...
High-level programming languages have gone a long way since the invention of Short Code in 1949. New languages are being created all the time, sometimes as a joke, but most times to deal with specific problems that existing ones cannot solve. Althou...
Application security testing (AST) requires a comprehensive approach that can catch modern, sophisticated threats from multiple angles and covers all attack surfaces. Unfortunately, you can’t mount such a multi-tiered defense with only one tool. You’ll need d...
Food for Thought: On-premises Goes Hybrid Using application security testing (AST) tools has many benefits; for example increasing the speed, efficiency and coverage paths for testing applications. However, there are many reasons why individuals may feel inse...
Announcement: End of Support for TLS 1.0 and 1.1. On March 1st Kiuwan will disable support for TLS 1.0 and 1.1. Why? Only 3% of our systems traffic uses TLS 1.0., so we have decided to disable support for it from March 2020 onwards. What is TLS?&nbs...
Web apps are now one of the top favorites—if not the absolute favorite—means of attack by cyberthieves, based on the latest Verizon Data Breach Investigations Report, which examined 41,686 security incidents, including 2,013 confirmed data breaches. The data ...
Hacking has been going on for decades, so it is unsurprising that with a society as technological as ours, more and more companies and private people are experiencing attacks. Hacking is the primary way in which attackers try to gain access and...
Every year, Kiuwan makes predictions concerning what’s in store for cybersecurity for the coming year based on prior events, current trends, and statistics. While year-end predictions are commonplace, what’s uncommon are follow-ups to see if said ...
There are three phases of defending against cyber attacks: putting in place sufficient protections and robust authentication mechanisms to try and prevent attacks; appropriately defending against an active attack once it is discovered, and communicating accur...