Kiuwan logo

AppSec Blog

Keep up with the latest news on cybersecurity, technical trends, and programming best practices.

Recent Posts

Idera Inc. Aquires Kiuwan

Idera, Inc. Acquires Kiuwan and Bolsters Testing Tools Business with Application Security and Code Testing Capabilities Adding security to DevOps processes will empower developers with state-of-the-art insights and analysis HOUSTON – Oct. 5, 2018&nb...
Idera acquires Kiuwan graphic

The Cybersecurity Threats of 2018 vs. 2024

Each year, cybersecurity thought leaders predict the threats we may face, but these trends often evolve slowly over time. Despite technological advances, there aren’t usually dramatic changes from one to the next with respect to cybersecurity threats. These t...

OWASP Top 10 2017: A4 XML External Entities (XXE)

Understanding How External Entities Attack XML Files Extensible Markup Language (XML) files are plain-text files that describe data behavior as that data relates to a connected network or server application. If you open an XML file, you’ll see code describing...

How to Implement Shift Left in DevSecOps

The number and sophistication of cyberattacks are increasing year after year. Now it’s the time, more than ever, to start implementing security testing within your Software Development Life Cycle. Shifting left in the SDLC empowers software teams to detect op...
Shift left model graphic

OWASP Top 10 2017: A6 Security Misconfiguration

Security misconfigurations are “holes” or weaknesses within your computer applications that leave your system vulnerable to attack. These misconfigurations allow easy exploitation from threat agents from both inside and outside of your company. The good news ...

OWASP Top 10 2017: A7 Cross-site Scripting (XSS)

How to Resolve and Prevent XSS Cross-site scripting (XSS) occurs when an attacker injects malicious script, like JavaScript, into your web browser which compromises an infected web site. When the user inputs data into the visited web site, the malicious code ...

OWASP Top 10 2017: A2 Broken Authentication

OWASP Top 10 2017 – A2 Broken Authentication Authentication and session management includes verifying user credentials and managing their active sessions. Broken authentication and session management occurs when credentials cannot be authenticated and session...

OWASP Top 10 2017: A1 Injection

Are you at risk of an injection attack? These types of attacks are common, primarily because they affect ubiquitous SQL databases. If a user — internal or external — supplies information through a form, you may be at risk. Insufficient input validation may al...

See Kiuwan in Action

App and software breaches can have lasting consequences. They also aren’t going anywhere. Finding vulnerabilities in your app and code early is critical. Maintaining strong security practices during and after development is essential to protecting your business.
© 2024 Kiuwan. All Rights Reserved.