Managing API Security for AI Programming

AI-based API security can build models of what’s normal, and be taught to recognize anomalous or unwanted patterns of activity that often signal attacks.

Securing Serverless Applications

Serverless applications don’t really run without any servers involved. Rather, serverless applications run inside cloud-based infrastructures so that developers and operators need no longer stand up and run their own servers, virtual or physical.

Comprehensive Guide to Cyber Insurance

Whether launched by criminals, insiders, or run-on-the-mill hackers, the likelihood of a cyberattack exists, and both small and established organizations face the risk of moderate or severe harm. As a component of their risk management strategy, companies now have to routinely decide the risks to accept, control, avoid, or transfer.

Canary in a Coal Mine: Detecting Cyberattacks Early

Since the first step in responding to a security incident is to identify that an incident has occurred, identification becomes important to survival.

Getting Ahead of Payment Card Security Threats

There is a disturbing trend of cybercriminals discovering and leveraging novel ways to steal payment cards credentials during online

Securing Cloud Access in Applications

Organizations must realize and own up to their responsibility for data, even when it leaves their hands and goes into the cloud.

Beyond SolarWinds: Guarding Against the Rising Threat of Supply Chain Attacks

The SolarWinds attack was not the first attack on the IT supply chain, and it looks like the number of similar attacks is increasing.

Healthcare Sector Application Security: Preventing Threats from Becoming Attacks

In the healthcare industry, software security isn’t a state of being or a single action; it is a process, and requires more than hardening your software.

7 Database Security Principles and Practices

Databases typically contain organization’s personnel information, financial data of all kinds, and data describing its physical inventory and assets. DB security is vitally important to an organization’s health and its ability to conduct business. Here are seven basic principles and practices for securing a database.

Cybersecurity Trends in Fintech

As Fintech’s popularity grew in 2020, so did its attack surface. Let’s look at the most important cybersecurity trends in Fintech.

Gambling with Security: Mitigating Threats to Online and Mobile Gaming

Protecting games of chance against online gambling security threats in 2021 is more important than ever, especially where mobile gambling is concerned.

Release Announcement — January 28, 2021

The Kiuwan team is pleased to announce the availability of our latest release.

A Timeline of the Solarwinds Hack: What We've Learned

Here's a timeline of the major events in the SUNBURST attack, followed by recommendations for organizations to protect against supply-chain threats.

Virtual CISO: Leveraging External Security Expertise

Organizations that lack the budget for a CISO are increasingly turning to an outsourced solution: the virtual CISO, or vCISO. Let’s look at what a vCISO does and how one can benefit small and medium-sized businesses.

Secure Remote Access: Keeping Employees and the Organization Safe

In this age of lockdowns, social distancing and working from home, organizations must think carefully about how to extend their networks and services across the internet and into employees’ and contractors’ homes.