Application Security News and Articles


Cyber Week 2023 & The Israel National Cyber Directorate Presents – AI Governance in the Wake of ChatGPT – Policy and Governance

Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel. Permalink The post Cyber Week 2023 & The Israel National ...

2023 OWASP Top-10 Series: API9:2023 Improper Inventory Management

Welcome to the 10th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a particular focus on security practitioners. This post will focus on API9:2023 Improper Inventory Management. In this series we are taking an ...

The Role of AI and Machine Learning in Strengthening Cloud Security

Cloud computing has become essential for modern business operations, offering flexibility, scalability, and accessibility for data storage, processing, and application deployment. However, the convenience of the cloud also raises security ...

LastPass: ‘Horse Gone Barn Bolted’ is Strong Password

The password manager service LastPass is now forcing some of its users to pick longer master passwords. LastPass says the changes are needed to ensure all customers are protected by their latest security improvements. But critics say the move is ...

The Threat Landscape for Healthcare Organizations

The threat landscape for healthcare organizations has shifted tremendously since the outset of COVID-19. The means, opportunities, and motives for threat actors targeting the sector have all changed in nature and increased in intensity. While the ...

Cyber Week 2023 & The Israel National Cyber Directorate Presents – Guarding the Cyber Galaxy: Electronic-Cyber Defense in Space

Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel. Permalink The post Cyber Week 2023 & The Israel National ...

Cybersecurity Insights with Contrast CISO David Lindner | 9/22

Insight #1 There will always be a balance in the psychological acceptability of any security controls put on users. This is especially important when developing a data loss prevention (DLP) strategy for your organization. The post Cybersecurity ...

Is DevSecOps Just DevOps Reinvented?

The difference between DevSecOps and DevOps The advent of DevOps—short for Development and Operations—provided an efficient approach for streamlining the software... Read more » The post Is DevSecOps Just DevOps Reinvented? appeared first on ...

What is CMDB?

In the dynamic realm of IT infrastructure and network management, the CMDB has emerged as a crucial tool for IT professionals. However, what precisely is it, and how does it enhance operational efficiency and security for businesses? Let us ...

Web Application Firewall vs Firewall: What You Need to Know

Introduction In today’s interconnected world, the significance of cybersecurity cannot be overstated. This is especially true as cyber threats continue to evolve at an alarming rate. The digital landscape of 2023 is fraught with sophisticated ...

Introducing LLoda – Your Personal Security Assistant

While vendors strive to create easy to use products and organizations provide user training, it is clear that issues arise and end users have questions which ultimately affect productivity.   Here’s a quick look at some interesting stats on IT ...

China Accuses US of Years of Cyber-Spying, Malware Campaigns

The Chinese government is accusing the United States intelligence community of launching cyber-espionage campaigns against the country for years after hacking into Huawei servers as far back as 2009. China’s Ministry of State Security (MSS) ...

Randall Munroe’s XKCD ‘xkcd Phone Flip’

via the comic artistry and dry wit of Randall Munroe, maker of XKCD! Permalink The post Randall Munroe’s XKCD ‘xkcd Phone Flip’ appeared first on Security Boulevard.

Get the Gist of CJIS

Does your organization access CJIS? If so, the deadline for compliance is October 1st, 2023. In the latest CJIS Security Policy, the FBI is now requiring that IT firmware be verified for integrity and monitored for unauthorized changes. Failure ...

The Battle Against Cyber Shadows: Ensuring PCI-DSS Compliance Amidst Hidden Threats

Digital footprints are expanding at an unprecedented rate, with individuals leaving traces of their credit or debit card information every time they click ‘Buy Now.’ In the swirling vortex of online transactions, a treasure trove of payment ...

How Silverfort Can Help Organizations Align with NIST’s Cybersecurity Framework Version 2.0

As cyber threats continue to evolve and become more sophisticated, protecting identities and access has never been more critical. To help organizations manage digital risks, the National Institute of Standards and Technology (NIST) has provided ...

Vendor Risk Assessment Challenges: What You Need to Know

Right now, your company is likely working with dozens or hundreds of third-parties (e.g., SaaS vendors, cloud infrastructure, professional service firms) to handle all kinds of business processes. Some of them are in possession of your ...

Mastering the Art of Vulnerability Prioritization: A Step-by-Step Guide

The average vulnerability and patch management backlog now contains over 100,000 vulnerabilities, making better vulnerability prioritization essential to ensure the most pressing threats are promptly addressed. In this blog, we’ll delve deeper ...

Cyber Week 2023 & The Israel National Cyber Directorate Presents – Building Cyber Resilience

Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel. Permalink The post Cyber Week 2023 & The Israel National ...

Signal Intros Quantum-Resistant Encryption for App

The developers of the Signal messaging app are strengthening the app’s central encryption capabilities for the upcoming post-quantum era. Signal is upgrading the Signal Protocol – the cryptographic specifications behind the end-to-end ...