Application Security News and Articles


From passwords to passkeys: Enhancing security and user satisfaction

In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data breaches and improves user experience by simplifying the login process. Lamb also ...

Improving OT cybersecurity remains a work in progress

Organizations have made progress in the past 12 months related to advancing their OT security posture, but there are still critical areas for improvement as IT and OT network environments continue to converge, according to Fortinet. Cyberattacks ...

Most cybersecurity pros took time off due to mental health issues

Cybersecurity and infosecurity professionals say that work-related stress, fatigue, and burnout are making them less productive, including taking extended sick leave – costing US enterprises almost $626 million in lost productivity every year, ...

eBook: CISO guide to password security

Password security has seen dramatic shifts driven by the escalation of cyber threats and technological advancements. This eBook covers: Best practices for NIST-compliant password security Key benefits of automating password policies It is not ...

Obtaining Security Budgets You Need (Not Deserve): Ira Winkler’s Cybersecurity Playbook for Executives

The biggest problem in cyber security is that CISOs get the budgets they deserve, not the budgets they need—and they need to learn to deserve what they need. The post Obtaining Security Budgets You Need (Not Deserve): Ira Winkler’s ...

Managing Transitive Vulnerabilities

Transitive vulnerabilities are developers’ most hated type of security issue, and for good reason. It’s complicated enough to monitor for and fix direct vulnerabilities throughout the software development lifecycle (SDLC). When software is ...

New Blog Moderation Policy

There has been a lot of toxicity in the comments section of this blog. Recently, we’re having to delete more and more comments. Not just spam and off-topic comments, but also sniping and personal attacks. It’s gotten so bad that I need to do ...

USENIX Security ’23 – BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing

Authors/Presenters:Mingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from ...

The Fundamental Issues with Email and How PreVeil Addresses Them

Email is the backbone of modern communication, both in personal and professional settings. Despite its widespread use and critical importance, traditional email systems suffer from significant security vulnerabilities at three key points: the ...

IRONSCALES Applies Generative AI to Phishing Simulation

IRONSCALES has made generally available a phishing simulation tool that makes use of generative artificial intelligence (AI) to enable cybersecurity teams to create as many as 2,000 simulations of a spear phishing attack in less than an hour. The ...

Next-Generation VPN Security Needs To Be Quantum Safe

Everytime you connect to the internet, cryptography keeps your communication safe and secure. The digital age thrives on the secure exchange of information. But how safe is your communication? According to the FBI (Federal Bureau of ...

DNS and Your Privacy: Should you use encrypted DNS?

DNS enables the easy navigation from website to website as you currently know it. However, the system wasn’t exactly designed with your privacy and security in mind. Many DNS resolvers - such as your internet service provider's (ISP) - do not ...

Juneteenth National Independence Day 2024

Permalink The post Juneteenth National Independence Day 2024 appeared first on Security Boulevard.

Implementing AI in Startups: Key Strategies for Success

Artificial Intelligence (AI) is revolutionizing industries by enabling smarter decisions, automating tasks, and providing deeper insights. For startups, implementing AI projects can be a game-changer,...Read More The post Implementing AI in ...

The Distributed Workforce: Why Flexibility and Trust are Essential in Cybersecurity

A distributed workforce allows us to secure a globally connected world. It widens our talent pool, accelerates innovation, and increases our 24/7 vigilance The post The Distributed Workforce: Why Flexibility and Trust are Essential in ...

USENIX Security ’23 – AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering

Authors/Presenters:Ji Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations ...

The Resurgence of Major Data Breaches?

In the past few weeks, we have noticed an alarming increase in major data breaches, with millions of records being exposed and shared on dark web forums. This resurgence has been largely driven by a user who appears to be using the name ...

How to Detect and Prevent Insider Threats in a Virtual Environment [Hands-on Guide]

The rising use of virtual environments (VEs) has transformed the ways we work, offering increased flexibility and accessibility. However, this shift also introduces new security challenges. Traditional security measures may not work as ...

Pure Storage enhances its platform with cyber resiliency services and capabilities

Pure Storage announced three new Storage as-a-Service (STaaS) service-level agreements (SLAs) for the Pure Storage platform – cyber recovery and resilience and site rebalance – further empowering organizations to guarantee outcomes ...

Cybersecurity Worker Burnout Costing Businesses Big

The constant vigilance required to protect against evolving threats, and the sheer volume of routine tasks that demand attention contribute significantly to burnout. The post Cybersecurity Worker Burnout Costing Businesses Big appeared first on ...