Application Security News and Articles


AxoSyslog: Open-source scalable security data processor

AxoSyslog is a syslog-ng fork, created and maintained by the original creator of syslog-ng, Balazs Scheidler, and his team. “We first started by making syslog-ng more cloud-ready: we packaged syslog-ng in a container, added helm charts, and ...

Product showcase: Augmenting penetration testing with Plainsea

Human-led penetration testing is an essential practice for any organization seeking to proactively address potential attack vectors. However, this indispensable pentesting method is often limited by several factors: high resource demands, project ...

CWE top 25 most dangerous software weaknesses

The CWE list of the 25 most dangerous software weaknesses demonstrates the currently most common and impactful software flaws. Identifying the root causes of these vulnerabilities provides insights to shape investments, policies, and practices ...

Enhancing visibility for better security in multi-cloud and hybrid environments

In this Help Net Security interview, Brooke Motta, CEO of RAD Security, talks about how cloud-specific threats have evolved and what companies should be watching out for. She discusses the growing complexity of cloud environments and the ...

Preventing credential theft in the age of AI

In this Help Net Security video, Tina Srivastava, MIT Lecturer and CEO of Badge, discusses a 20-year cryptography problem – using biometrics for authentication without storing a face/finger/voice print. This has massive implications for ...

Full recovery from breaches takes longer than expected

In 2024, businesses reported taking an average of 7.3 months to recover from cybersecurity breaches – 25% longer than expected and over a month past the anticipated timeline of 5.9 months, according to Fastly. Cybersecurity leaders feel ...

Sentient IAM: Unlocking Success Through Human-Centric Leadership

Discover how servant leadership and a human-centric approach to IAM drive trust, resilience, and impactful results in today’s complex business landscape. The post Sentient IAM: Unlocking Success Through Human-Centric Leadership first appeared ...

Respond to Fewer Alerts with Automated Grouping

Smart SOAR’s automated grouping reduces the noise by filtering out irrelevant alerts, enabling a faster and more efficient response. The post Respond to Fewer Alerts with Automated Grouping appeared first on D3 Security. The post Respond to ...

SOC 2 Compliance Audit: Safeguarding Your Business’s Data

Are you a service organization seeking an audit to gain customers’ trust? Or maybe you are looking to attract prospective clients by proving how serious you are with customers’ data. If that is the case, you have come to the right place. ...

Build Confidence with Robust Machine Identity Solutions

How Robust Are Your Machine Identity Solutions? As cybersecurity threats and data breaches continue to soar, the question becomes inevitable: how robust are your machine identity solutions? For many organizations, the answer remains shrouded in ...

DEF CON 32 – A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth

Authors/Presenters: Pete Stegemeyer Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

How to Move from Manual to Certificate Automation with ACME

For IT teams, managing certificates can feel like a relentless cycle of tracking expiration dates, renewing certificates, and monitoring CA chains. Without automation, it’s easy to miss renewals, leading to costly outages and downtime. As your ...

How to Motivate Employees and Stakeholders to Encourage a Culture of Cybersecurity

Cybersecurity impacts us all. Third parties process and handle data every day, whether they’re tapping your phone to pay via near-field communication (NFC) or processing a transaction while you pay your utility bill online. The importance of ...

Microsoft Adds Raft of Zero-Trust Tools and Platforms

Microsoft this week launched a raft of cybersecurity initiatives that address everything from making Windows platforms more secure to adding platforms that are more secure by design. The post Microsoft Adds Raft of Zero-Trust Tools and Platforms ...

Securing the Software Supply Chain: Checkmarx One Expands its Offerings

The software supply chain is under siege. Threat actors increasingly exploit weaknesses in code repositories, dependencies and mismanaged secrets to infiltrate and disrupt software development processes. In response, organizations are turning to ...

Shift Left and Shift Up Workload Attack Surface Protection

In today’s security landscape, the concept of a hardened perimeter is increasingly insufficient. With the rise of hybrid and multi-cloud environments, lateral movement attacks, where attackers move through internal systems once a breach has ...

Empower Your Security with Advanced IAM Features

Why Embrace Advanced IAM Features? The world is witnessing a major shift to cloud-based operations, leading to a surge in non-human identities (NHIs) such as bots, service accounts, and APIs. These non-human entities can pose significant threats ...

Randall Munroe’s XKCD ‘Kedging Cannon’

via the comic humor & dry wit of Randall Munroe, creator of XKCD The post Randall Munroe’s XKCD ‘Kedging Cannon’ appeared first on Security Boulevard.

Azure Key Vault Tradecraft with BARK

Brief This post details the existing and new functions in BARK that support adversarial tradecraft research relevant to the Azure Key Vault service. The latter part of the post shows an example of how a red team operator may use these commands ...

Microsoft Veeps Ignite Fire Under CrowdStrike

BSODs begone! Redmond business leaders line up to say what’s new in Windows security. The post Microsoft Veeps Ignite Fire Under CrowdStrike appeared first on Security Boulevard.