Application Security News and Articles


SEGs and Credential Phishing (Part 3)

If you’ve followed Part 1 and Part 2 of this series, you already know one of the biggest takeaways from our inbox-level research: Credential phishing is consistently one of the most-missed types of attacks. The post SEGs and Credential Phishing ...

Zyxel Networks upgrades USG FLEX H series firewalls

Zyxel Networks announced its USG FLEX H series firewalls have been upgraded to combine both cloud and on-premises network security into a single seamless solution for small- and medium-sized businesses and managed service providers. Unlike most ...

Strategic Tool Consolidation for CISOs

“Let’s buy one more tool,” – isn’t it something you have heard before? The CISO toolbox is so jam-packed that it’s even tough to remember the work of each tool.... The post Strategic Tool Consolidation for CISOs appeared first on ...

GitGuardian Launches NHI Governance to Secure Non-Human Identities and Their Secrets for Enterprises

Secrets sprawl is a growing cybersecurity challenge, especially with NHIs. GitGuardian's new NHI Governance product offers centralized inventory and lifecycle management to help enterprises regain control over their secrets and prevent costly ...

Prophylactic Cybersecurity for Healthcare

How to Be Proactive in a Reactive World In healthcare, preventative medicine is always more effective, less costly, and has better outcomes than waiting until after a serious heart incident occurs. It’s an apt analogy for cybersecurity as well. ...

How to Outsource Your Humanity 101

You’re so busy climbing the corporate ladder that you can’t spare five minutes to ring mum and dad. But fear not! For a mere £24.90 a month, you can now hire a silicon-based impersonator to pretend it cares about your parents’ day. Welcome ...

Anomaly Detection at Scale: Machine Learning Approaches for Enterprise Data Monitoring

Anomaly detection involves methods that assist in identifying data points or occurrences that differ from the anticipated behavior patterns. The post Anomaly Detection at Scale: Machine Learning Approaches for Enterprise Data Monitoring appeared ...

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

China accuses three alleged U.S. NSA operatives of cyberattacks targeting critical infrastructure and the Asian Games in Harbin. The post China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games appeared first on SecurityWeek.

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Partisia, Squareroot8, and NuSpace join forces in a global partnership to advance quantum-safe communications. The post Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats appeared first on ...

Critical flaws fixed in Nagios Log Server

The Nagios Security Team has fixed three critical vulnerabilities affecting popular enterprise log management and analysis platform Nagios Log Server. About the flaws The vulnerabilities, discovered and reported by security researchers Seth Kraft ...

NetRise Raises $10 Million to Grow Software Supply Chain Security Platform

The funding round brings the total amount raised by the NetRise to roughly $25 million. The post NetRise Raises $10 Million to Grow Software Supply Chain Security Platform appeared first on SecurityWeek.

Hertz Discloses Data Breach Linked to Cleo Hack

Customers of the Hertz, Thrifty, and Dollar brands had their personal information stolen as a result of the Cleo hack last year. The post Hertz Discloses Data Breach Linked to Cleo Hack appeared first on SecurityWeek.

CISO Conversations: Maarten Van Horenbeeck, SVP & Chief Security officer at Adobe

Van Horenbeeck's career spans some of the biggest companies in tech: Verizon, Microsoft, Google, Amazon, Zendesk, and now SVP and CSO at Adobe. The post CISO Conversations: Maarten Van Horenbeeck, SVP & Chief Security officer at Adobe ...

NSFOCUS WAF New UI Showcase: Brand New Policy and Template Management Workflow

Three-Tier Protection Rules • Basic Protection: Pre-configured, general and popular security rules for out-of-box deployment.• Optional/Advanced Protection: Advanced rules, customized for specific Web/API applications for optimum protection. ...

The Great Security Tool Consolidation: How Enterprises are Rethinking Their Security Strategy 

Security teams are increasingly abandoning the long-standing approach of deploying numerous specialized point solutions in favor of consolidated security platforms. The post The Great Security Tool Consolidation: How Enterprises are Rethinking ...

Evolution to Detective Identity Security

This week I wrote a guest article for Breez Security discussing the need for and evolution to a more detective element in our identity security landscape. Our the past two decades organisations and IAM related vendors have supported a model of ...

The Hidden Cost of Backup Recovery in Ransomware Events

Ransomware preparedness isn’t just about having backups – it’s about how quickly you can use them to recover. The post The Hidden Cost of Backup Recovery in Ransomware Events appeared first on Security Boulevard.

My Take: Is Amazon’s Alexa+ a Gutenberg moment — or a corporate rerun of history’s greatest co-opt?

Last Friday morning, April 11, I was making my way home from NTT Research’s Upgrade 2025 innovation conference in San Francisco, when it struck me that we’re at a watershed moment. I was reflecting on NTT’s newly launched Physics of … ...

Seemplicity adds AI-driven capabilities to scale remediation operations

Seemplicity announced a major product release. This latest version of the Seemplicity Platform introduces powerful new AI-driven capabilities designed to streamline and scale remediation operations. Two major new features – called ...

Top Four Considerations for Zero Trust in Critical Infrastructure

Top Four Considerations for Zero Trust in Critical Infrastructure madhav Tue, 04/15/2025 - 06:43 TL;DR Increased efficiency = increased risk. Critical infrastructure organizations are using nearly 100 SaaS apps on average and 60% of their most ...