DevSecOps: Building a Culture of Responsibility for Network Security

Security vulnerabilities are everywhere. If nothing else, the 

Application Inventory Management

How Application Inventory Management Unlocks Your App for Affordable Maintenance and Development   As your application grows in complexity, it's critical to maintain a strong understanding of its back-end functionality.

Static Analysis in Automated Software Quality Tests

Software quality management solutions function with automated tests that use static analysis processes to generate 

Why Automated Code Reviews Need to Include Security Audits

When you and your team are coding a web app, you do your best to avoid any potential security holes in the code.

Gain full control of open source components

Almost every developer relies to some degree on open source software, and it's tough to beat the flexibility of open use and distribution licensing.

Security standards in software development

The need for security in all things technology is well-known and paramount.

Application Security in Devops

Why Application Security Is More Critical Than Ever in DevOps Application security was obviously always important in DevOps environments, but the need for a high level of security is getting stronger and stronger daily.

Continuous analysis with Team Foundation Server (TFS) 2017

Microsoft Team Foundation Server and Kiuwan are old pals.

OWASP Top 10 2017 – A10 Underprotected APIs

Number 10 on OWASP's list of application security risks is 

OWASP Top 10 2017 – A9 Using Components with Known Vulnerabilities

Once every few years, OWASP releases a Top 10 list, featuring the ten most significant security risks related to developing web applications.

OWASP Top 10 2017 – A8 Cross Site Request Forgery (CSRF)

Defending Against Cross Site Request Forgery

OWASP Top 10 2017 – A6 Sensitive Data Exposure: Identify Your Weaknesses

Number 6 on the OWASP Top 10 2017 list is A6-Sensitive Data Exposure.

Continuous analysis with JetBrains TeamCity

Everybody knows the benefits of CI in the SDLC. I’m not discovering new ground here, but what’s interesting is that you can leverage your continuous integration processes to have a continuous analysis processes to have all the objective information you need from your applications at build time with Kiuwan.

OWASP Top 10 2017 – A5 Security Misconfiguration

Security misconfigurations are "holes" or weaknesses within your computer applications that leave your system vulnerable to attack.