Application Security News and Articles


WhyLabs AI Control Center offers teams real-time control over their AI applications

WhyLabs launched a new type of AI operations platform: the AI Control Center. The new platform, which offers teams real-time control over their AI applications, was developed by WhyLabs in response to rising security and reliability threats posed ...

ESET integrates with Arctic Wolf to provide greater security visibility

ESET has unveiled a new integration with Arctic Wolf, to ensure increased visibility and protection against modern threats. By integrating ESET Inspect into Arctic Wolf’s Security Operations Platform, Arctic Wolf customers are able to ...

How a YouTube Content Filter Can Give Your District More Control

You know YouTube, and you probably love YouTube. Beyond a place to share creative videos, it can be a great educational resource. However, it’s not all sunshine and rainbows. Although YouTube has fairly strict policies regarding the type of ...

Sublime Security secures $20 million to strengthen cloud email security and visibility

Sublime Security has raised $20 million in Series A funding, led by Index Ventures with participation from previous investors Decibel Partners and Slow Ventures. Cybersecurity visionary and Crowdstrike Co-founder & former CTO Dmitri ...

56% of cyber insurance claims originate in the email inbox

56% of all 2023 claims were a result of funds transfer fraud (FTF) or business email compromise (BEC), highlighting the importance of email security as a critical aspect of cyber risk management, according to Coalition. The 2024 Cyber Claims ...

Anatomy IT’s new Security Suite targets healthcare cybersecurity threats, improves incident response

Anatomy IT has announced the launch of an expanded end-to-end cybersecurity product suite designed to safeguard healthcare delivery organizations from evolving and growing IT system threats. A record 133 million individuals were affected by ...

Dropbox announces a number of security and data protection features

Dropbox announced new security, organization, and sharing features to give teams the control, flexibility, and speed to get work done from anywhere. In the modern workplace, teams are spread across locations, time zones, and even different ...

AuditBoard AI automates important tasks for security teams

AuditBoard announced that its powerful artificial intelligence capabilities are now generally available. As part of the company’s innovative and award-winning connected risk platform, AuditBoard AI incorporates generative AI, and other ...

Appdome upgrades MOBILEBot Defense for tailored WAF integration

Appdome has enhanced its MOBILEBot Defense solution to empower mobile brands to get more value and control from their existing web application firewall (WAF) infrastructures by adjusting the evaluation, detection, and defense policy to suit each ...

Fireblocks expands DeFi suite with threat detection features

Fireblocks introduced new security features to its DeFi suite: dApp Protection and Transaction Simulation. As the DeFi sector experiences unprecedented growth, the need for proactive security measures has never been more critical. With attackers ...

Nagomi Security raises $30 million to help security teams improve their level of protection

Nagomi Security emerged from stealth with $30 million in funding to fundamentally redefine how security teams optimize effectiveness and drive efficiency from their existing security tools. The company operated in stealth mode with Seed funding ...

BforeAI raises $15 million to prevent attacks before they occur

BforeAI has secured $15 million in Series A funding led by SYN Ventures, with renewed participation from early investors Karma Ventures, Karista, Addendum Capital, and a new investment from the Partnership Fund for New York City. BforeAI ...

ITDR vs ISPM: Which Identity-first Product Should You Explore?

Understanding ITDR and ISPM In the cybersecurity world, two emerging identity-centric categories promise to provide... The post ITDR vs ISPM: Which Identity-first Product Should You Explore? appeared first on Axiad. The post ITDR vs ISPM: Which ...

Applying DevSecOps principles to machine learning workloads

Protecting data and other enterprise assets is an increasingly challenging task, and one that touches nearly every corner of an organization. As the complexity of digital systems grows, the challenges mount. One method that helps reign in the ...

Overcoming GenAI challenges in healthcare cybersecurity

In this Help Net Security interview, Assaf Mischari, Managing Partner, Team8 Health, discusses the risks associated with GenAI healthcare innovations and their impact on patient privacy. What are the key cybersecurity challenges in healthcare in ...

25 cybersecurity AI stats you should know

In this article, you will find excerpts from reports we recently covered, which offer stats and insights into the challenges and cybersecurity issues arising from the expansion of AI. Security pros are cautiously optimistic about AI Cloud ...

73% of SME security pros missed or ignored critical alerts

Small and medium-sized enterprises (SMEs) IT staff is overwhelmed by the complexity and demands of managing multiple tools in their security stack, leading them to miss critical severity events and weaken their company’s security posture, ...

“You Can’t Protect What You Can’t See” Still Rings True. Why Observability Now.

Remember the old saying: “You can’t protect what you can’t see”? When I started preaching about it as part of the marketing launch for Real-time Network Awareness (RNA) it seemed pretty obvious that we needed more visibility in order to ...

Transforming Customer Experience: Enhancing CX through CIAM and Insights

Learn how to elevate your CX strategies with CIAM and data-driven insights. From seamless digital experiences to proactive customer engagement, discover the key to driving growth and loyalty in a competitive market. The post Transforming Customer ...

What is Penetration Testing: A comprehensive business guide

Penetration testing, or pen testing for short, is a critical way to protect IT systems and sensitive data from malicious activity proactively. This guide provides a comprehensive overview of how this technique works, business benefits, its types, ...