7 Database Security Principles and Practices

Databases typically contain organization’s personnel information, financial data of all kinds, and data describing its physical inventory and assets. DB security is vitally important to an organization’s health and its ability to conduct business. Here are seven basic principles and practices for securing a database.

Cybersecurity Trends in Fintech

As Fintech’s popularity grew in 2020, so did its attack surface. Let’s look at the most important cybersecurity trends in Fintech.

Gambling with Security: Mitigating Threats to Online and Mobile Gaming

Protecting games of chance against online gambling security threats in 2021 is more important than ever, especially where mobile gambling is concerned.

Release Announcement — January 28, 2021

The Kiuwan team is pleased to announce the availability of our latest release.

A Timeline of the Solarwinds Hack: What We've Learned

Here's a timeline of the major events in the SUNBURST attack, followed by recommendations for organizations to protect against supply-chain threats.

Virtual CISO: Leveraging External Security Expertise

Organizations that lack the budget for a CISO are increasingly turning to an outsourced solution: the virtual CISO, or vCISO. Let’s look at what a vCISO does and how one can benefit small and medium-sized businesses.

Secure Remote Access: Keeping Employees and the Organization Safe

In this age of lockdowns, social distancing and working from home, organizations must think carefully about how to extend their networks and services across the internet and into employees’ and contractors’ homes.

6 Threats to Development Team Productivity

Productivity rates are critical to success in any industry. That is true of software products, too, that not only need to be efficiently produced but secure from cyberattacks as well.

Rethinking Application Security in a Post-Pandemic World

Without a doubt, the COVID-19 pandemic has had a massive impact on the financial services landscape.

Low-Hanging Fruit: The Top 8 Cybersecurity Vulnerabilities in Enterprise Software

Learning about the most common security gaps found in software, why those gaps really matter, and how to close them can make you less likely to be the next big victim.

Which App Security & Quality Analytics Should You Be Tracking?

As management expert Peter Drucker once put it: "If you can't measure it, you can't improve it." This quote feels right in place in the world of application security.

The Role of SAST in DevSecOps

As DevSecOps continuously pushes security "to the left" in the software development process, autonomous assessment can provide assurance of security compliance from development’s earliest stages.

OpenSSF Takes a Collaborative Approach to Open Source Security

To help make open source software more secure, the Linux Foundation has announced a cross-industry collaboration with open source leaders including GitHub, Google, IBM, JP Morgan Chase, Microsoft, Red Hat, the OWASP Foundation, and others.

Introduction to Cyber Threat Intelligence

Published November 11, 2020 Simply put, threat intelligence – also known as cyber threat intelligence, or CTI – is information that is collected, analyzed, organized, and refined to provide insight, input, and advice about potential and current security threats or attacks that could pose potential or actual risks to an organization.

Understanding OWASP ASVS

Here is a brief backgrounder on the OWASP and a closer look at the ASVS with special emphasis on what it does and why it’s important for application security.