Kiuwan logo

AppSec Blog

Keep up with the latest news on cybersecurity, technical trends, and programming best practices.

Recent Posts

Guarantee ISO Compliance with DevSecOps

The challenge of cybersecurity continues to plague web and mobile applications. Hacking techniques are evolving as fast as technological advances. In response to such threats, the International Standardization Organization (ISO) developed the ISO 27001 framew...
ISO Compliance with DevSecOps graphic

The Guide to Effective Application Inventory Management

As a company’s applications and digital infrastructure grow in complexity, it will need a more methodological approach to management to maintain back-end functionality. Companies can benefit from visualizing their application architecture and its dependencies...
Inventory management guide graphic

SOAR: The Future of IT Security

Today’s security professionals face a relentless barrage of alerts, a widening cybersecurity skills gap, and the constant pressure to do more with less. Manually triaging alerts, investigating incidents, and coordinating responses across disparate secur...

Why Cybercriminals Love REST

Many applications provide a services layer (to other applications, to a presentation layer, etc.). Or, they consume services exposed by third-parties (not necessarily trusted). A REST model is a simple, widely-used way for designing such service layers. This ...
Bad guys love REST graphic

See Kiuwan in Action

App and software breaches can have lasting consequences. They also aren’t going anywhere. Finding vulnerabilities in your app and code early is critical. Maintaining strong security practices during and after development is essential to protecting your business.
© 2024 Kiuwan. All Rights Reserved.