Application Security News and Articles


EU adopts Cyber Resilience Act to secure connected products

The EU Council has adopted the Cyber Resilience Act (CRA), a new law that aims to make consumer products with digital components safe(r) to use. CRA requirements The CRA outlines EU-wide cybersecurity standards for digital products, i.e. products ...

IronNet Has Shut Down

After retiring in 2014 from an uncharacteristically long tenure running the NSA (and US CyberCommand), Keith Alexander founded a cybersecurity company called IronNet. At the time, he claimed that it was based on IP he developed on his own time ...

CornCon X: Powering Cybersecurity Innovation Through Human Connection

At CornCon 2024, experts debunk myths, explore SaaS vulnerabilities, and highlight how human connections shape the future of cybersecurity innovation. The post CornCon X: Powering Cybersecurity Innovation Through Human Connection appeared first ...

Passwordless Authentication without Secrets!

Passwordless Authentication without Secrets! divya Fri, 10/11/2024 - 08:54 As user expectations for secure and seamless access continue to grow, the 2024 Thales Consumer Digital Trust Index (DTI) research revealed that 65% of users feel ...

The Sky is Falling! (Again)

We’ve been here before, haven’t we? Every other week, a new vulnerability with a sky-high CVSS score causes a frenzy. This time, it’s a 9.9 CVSS vulnerability that was billed as a gift to hackers – a remote exploit that would supposedly ...

Ubuntu 24.10 Oracular Oriole brings tighter security controls

Canonical released Ubuntu 24.10 Oracular Oriole, which brings notable advancements, including an updated kernel, new toolchains, and the GNOME 47 desktop environment, along with significant enhancements in software security. “Oracular Oriole ...

Cloud Ransomware Attack: Microsoft Sees Storm-0501 As Threat

Microsoft has recently identified a threat actor known as Storm-0501 targeting government, manufacturing, transportation, and law enforcement sectors in the United States (US) in a cloud ransomware attack campaign. In this article, we’ll dive ...

Resilience in extreme conditions: Why DDIL environments need continuous identity access

Ensuring seamless operations in even the harshest environments is a necessity today. For organizations operating within the Department of Defense (DoD) space, identity resilience and continuity are essentially non-negotiable — as the stakes are ...

Data loss incidents impact patient care

92% of healthcare organizations experienced at least one cyber attack in the past 12 months, an increase from 88% in 2023, with 69% reporting disruption to patient care as a result, according to Proofpoint. Healthcare organizations struggle to ...

DORA regulation’s nuts and bolts

The frequency, sophistication, and impact of cyber-attacks on financial institutions have been rising. Given the economic system’s interconnected nature, disruptions in one institution can have cascading effects on the broader financial ...

Unlocking the power of cryptographic agility in a quantum world

In this Help Net Security interview, Glen Leonhard, Director of Key Management at Cryptomathic, discusses the role of cryptographic agility in mitigating risks posed by quantum computing. Cryptographic agility enables organizations to seamlessly ...

Scammers target Airbnb and Booking.com users

ESET researchers discovered that the organized scammer network Telekopye has expanded its operations to target users of popular accommodation booking platforms like Booking.com and Airbnb. They have also increased the sophistication of their ...

New infosec products of the week: October 11, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Action1, BreachLock, Commvault, Dashlane, Data Theorem, Edgio, Frontegg, and Qualys. Qualys Enterprise TruRisk Management unifies asset inventory and ...

How to setup passkeys in Apple Passwords app

Beginning with iOS 18, iPadOS 18, macOS Sequoia, and visionOS 2, the Passwords app allows you to manage your passwords, passkeys, and verification codes. Passwords app interface Creating passkeys Passkeys are a password alternative designed to ...

What you need to know to select the right GRC framework, North American Edition

Governance, risk, and compliance (GRC) frameworks help professionals assess an organization’s risk posture, align technological initiatives with business goals, and ensure regulatory compliance. However, choosing the appropriate framework can ...

How AI is being used this 2024 election season

AI has been quite the hot topic this year. It’s no wonder there’s been a lot of discussion, not just about its futuristic potential, but about its impact on the elections. The post How AI is being used this 2024 election season appeared first ...

News alert: SpyCloud accelerates supply chain risk analysis with new ‘IDLink’ correlation capability

Austin, TX, Oct. 10th, 2024, CyberNewswire — SpyCloud, the leader in Identity Threat Protection, announced that its SaaS Investigations solution has been enhanced with identity analytics that illuminate the scope of digital identities and ...

ADDO session: Building observability to increase resiliency

As part of the DevOps and DevSecOps track during Sonatype's 9th All Day DevOps (ADDO) event, AWS Senior Developer Advocate Guillermo Ruiz presented his session titled "Building Observability to Increase Resiliency." Well-applied observability ...

Podcast Episode 20: Interview with Alan Delahunty, his role as Vice President/Commercial Lines Agent

Unlock the secrets to navigating the ever-evolving world of cybersecurity and commercial insurance with expert insights from Alan Delahunty of McGriff Insurance. Discover how the complexity of cyber threats is reshaping insurance policies and ...

How the Auth0 and Aembit Integration Boosts Non-Human Access Security

3 min read The collaboration automates workload-to-workload access, simplifying security for API connections and reducing the risks associated with credential management. The post How the Auth0 and Aembit Integration Boosts Non-Human Access ...