Application Security News and Articles


BSides Exeter 2024 – Keynote: Matt Broomhall & Richard DeVere

Authors/Presenters: Matt Broomhall & Richard DeVere Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The ...

Week in review: How QR code attacks work and how to protect yourself, 10 must-reads for CISOs

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How QR code attacks work and how to protect yourself While QR codes are convenient, they also present significant risks. In the past few years, ...

How can NHI risks be reduced without compromising system performance?

Are your Non-Human Identities (NHIs) and Secrets effectively managed? NHIs and Secrets have emerged as crucial elements. However, the question looms: are these entities being effectively managed to reduce risks without compromising system ...

BSides Exeter 2024 – Keynote: Flushing Away Preconceptions Of Risk

Author/Presenter: Thom Langford Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter ...

Cruel And Vindictive By Design

(This post originally published on 47 Watch) Recent administrative changes at the Social Security Administration (SSA) reveal a concerning pattern of decisions that disproportionately impact vulnerable populations while being implemented in ways ...

What are the best governance practices for managing NHIs?

What Drives the Need for Effective Non-Human Identities (NHIs) Governance Practices? Are we really addressing the potential dangers that lurk behind poorly managed non-human identities (NHIs)? With a sharp increase in the interconnectedness of ...

How can NHIs affect our overall threat landscape?

Are We Overlooking Non-Human Identities in Our Cybersecurity Strategy? How often do we give due consideration to the Non-Human Identities (NHIs)? The role of NHIs and their ‘secrets’ management in creating a robust and secure IT ...

How do I prioritize NHI risks in boardroom discussions?

Why is Risk Prioritization of Non-Human Identities Essential in Boardroom Discussions? Cybersecurity continues to command greater attention in organizational hierarchies, understanding the significance of Non-Human Identities (NHIs) risk ...

MSPs, IT Pros & Compliance Leaders Unite at Kaseya’s Landmark Compliance Summit

Go inside the landmark Kaseya Compliance Summit, a unique event featuring industry experts focused on compliance challenges and opportunities for small business. The post MSPs, IT Pros & Compliance Leaders Unite at Kaseya’s Landmark ...

BSides Exeter 2024 – Keynote: Become A Better Security Engineer (By Not Doing Security)

Author/Presenter: Kane Narraway Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 ...

‘Ban These Chinese Routers NOW,’ Cries House Committee

Sino stoppage scheme: TP-Link in crosshairs, along with other brands. The post ‘Ban These Chinese Routers NOW,’ Cries House Committee appeared first on Security Boulevard.

Guide: What is the CMMC-AB (Accreditation Body)?

Every year that goes by shows an improvement in technology, often by leaps and bounds over previous technology. What used to be the realm of far-off science fiction so unbelievably exotic that it defined genres is now a commonplace reality. With ...

AI Governance in AppSec: The More Things Change, The More They Stay the Same

Learn how AppSec teams can extend existing security and compliance practices seamlessly to AI. The post AI Governance in AppSec: The More Things Change, The More They Stay the Same appeared first on Security Boulevard.

US Seize Garantex in Cryptocurrency Money Laundering Bust

Two men linked to Garantex are accused of facilitating multi-billion dollar money laundering and sanctions violations. The post US Seize Garantex in Cryptocurrency Money Laundering Bust appeared first on SecurityWeek.

Our Latest Product Updates: API Lifecycle Graph and Others

In addition to our bi-directional Integration with Wiz, we have more product updates for you this month! The post Our Latest Product Updates: API Lifecycle Graph and Others appeared first on Security Boulevard.

In Other News: EntrySign AMD Flaw, Massive Attack Targets ISPs, ENISA Report

Noteworthy stories that might have slipped under the radar: Google discloses AMD CPU flaw named EntrySign, ISPs in the US and China targeted in massive attack, ENISA report on NIS2 Directive. The post In Other News: EntrySign AMD Flaw, Massive ...

The Evolution of Single Sign-On for Autonomous AI Agents: Securing Non-Human Identities in the Age of Agentic Automation

Explore the evolution of Single Sign-On for autonomous AI agents, focusing on securing non-human identities and the future of agentic automation security. The post The Evolution of Single Sign-On for Autonomous AI Agents: Securing Non-Human ...

BSides Exeter 2024 – Welcome From The Directors – BSides Exeter Orga

BSides Exeter 2024 - Welcome From The Directors - BSides Exeter Orga Authors/Presenters: The BSides Exeter Directors Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought ...

Cloud security gains overshadowed by soaring storage fees

Storage fees in general (e.g., API calls, operations, data access) comprise 49% of an average user’s service bill, compared to the actual stored capacity, according to a study conducted by Vanson Bourne. Nearly all organizations globally have ...