Why Hackers Attack – The Motives Behind Attackers

Published Jan 14, 2020 Hacking has been going on

Cybersecurity Predictions for 2020

Published Jan 7, 2020 Just like New Year's resolutions, a lot of people make predictions — but not everyone follows up on them.

Communicating with Customers in the Event of a Breach

Published Dec 30, 2019 There are three phases of defending against cyber attacks: putting in place sufficient protections and robust authentication mechanisms to try and prevent attacks; appropriately defending against an active attack once it is discovered, and communicating accurately and effectively to customers and shareholders: What happened Why it happened What it means Let's examine a major retailer's response to a recent attack for insights on effective approaches to communication with affected customers.

WASC Compliance: Guarantee App Security

Published Dec 17, 2019 DevOps processes have incredibly hastened the app development lifecycle leading to an exponential rise of apps getting into the market.

HIPAA Compliance for Secure Health Software

Published Dec 10, 2019 Developers all over the world have become keen on adopting a high level of application security, especially with the steady rise of cybersecurity threats.

The Top 10 Most Expensive Security Breaches

Published Dec 03, 2019 How much can a data security breaches really cost a company? What is the cost of a few infiltrated databases and stolen customer account information? The answer ranges between millions and billions of dollars in damages paid to those whose information was lost.

The Favorite Places For Security Holes To Hide

Published Nov 26, 2019 It's essential that CISOs hunt out security holes, whether unintentionally created by a careless coder or deliberately created by a cyberthief.

DIY: Generate OWASP Benchmark Results for Kiuwan Code Security

Originally published May 16, 2017. Updated November 20, 2019.

SANS Institute Top 25 Software Errors

Published Nov 20, 2019 The 

CERT Compliance: Provide Security For Your C Applications

Published Nov 07, 2019 Today's app development processes are not complete without security integration.

Guarantee ISO Compliance With DevSecOps Processes

Published Oct 18, 2019 The challenge of cybersecurity continues to plague web and mobile applications.

Security Standards in Software Development

Published Sep 20, 2019 The need for security in all things technology is well-known and paramount.

MISRA: Software Development Guidelines For The C Programming Language

Published Sep 05, 2019 MISRA C: A set of recommendations or guidelines for software development in C language developed by MISRA (The Motor Industry Software Reliability Association).

Continuous Integration In a Nutshell

Published Aug 29, 2019 What is continuous integration? Imagine that your organization is working on a major software project.

OWASP Top 10 2017 – A10 Insufficient Logging & Monitoring

Published Aug 20, 2019 Welcome to the final article in our blog series on the OWASP Top 10 Security Vulnerabilities.