Technical debt is a euphemism referring to the risk in production and potential rework assumed in software development. Due to rush and other factors, a lack of quality in deployed software developments is allowed. It is normal that resources or quality are l...
There is almost an endless list of reasons why application security is important to businesses. Those range from maintaining a positive brand image to preventing security breaches that impact the trust that your clients and shareholders have in your business....
Why Application Security Is More Critical Than Ever in DevOps Application security was obviously always important in DevOps environments, but the need for a high level of security is getting stronger and stronger daily. Here are a few reasons why you really n...
Recently, the Twitter engineering team (@TwitterEng) published an interesting library: DistributedLog, a replicated and highly efficient service to manage the logs of applications. A summary of its characteristics as found in the documenta...
Initially developed by Google, Angular has become one of the leading frameworks for web application development. Its popularity is due to the extensive capabilities it offers. However, Angular is complex, and taking full advantage of its features depends on h...
Kiuwan indicators are based on evidence. Part of that evidence —along with intrinsic code metrics— are the defects and vulnerabilities found in the source code analysis Right. What does Kiuwan consider a defect? A defect is a violation to a rule defined in th...
PCR’s (UK) Top 10 Biggest data breaches of 2020 PCR is a leading information source for IT resellers and distributors in the United Kingdom. It reports its top 10 based on the number of records breached in the incidents selected. They cite the Risk Based...
Although the term says “serverless,” serverless applications don’t really run without any servers involved. Rather, serverless applications run inside cloud-based infrastructures so that developers and operators need no longer stand up and run their own serve...
Social media, advanced technology, and the growing popularity of business transactions over the web continue to determine how organizations operate and communicate with their prospective customers. However, they’re also gateways to cyberattacks and data loss....
Canary in a Coal Mine: Detecting Cyberattacks Early Many catastrophic events are obvious, with their effects immediately visible — but not all. Fire, flood, tornadoes and earthquakes are all examples of events that can cause a substantial impact to business o...
Payment card attacks are nothing new. Cybercriminals have been targeting payment cards for more than a decade. However, there is a disturbing trend of cybercriminals discovering and leveraging novel ways to steal payment cards credentials during online transa...
As applications become increasingly cloud-based – or even, cloud-native – more and more such code is sending data to and from cloud-based stores, both public and private. This makes the methods and controls that such applications use to access the cloud of pa...