Application Security News and Articles


Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, and IIoT

In an era where cyber threats to critical infrastructure are growing in both sophistication and frequency, securing Operational Technology (OT), […] The post Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, ...

Insurance Firm Introduces Liability Coverage for CISOs

National insurance firm Crum and Forster is offering a professional liability program for CISOs who are facing growing regulatory pressures and sophisticate cyberattacks but often are not covered by their organizations' D&O policies. The ...

Gauging the Safety Level of Your Software with Spectra Assure

It’s been a little over a year since we first introduced security levels into Spectra Assure™ with the goal of reducing the remediation burden on developers. It automatically generates a plan for addressing prioritized software risks, ...

F5 AI Gateway secures and optimizes access to AI applications

F5 announced early access of F5 AI Gateway to streamline interactions between applications, APIs, and large language models (LLMs) driving enterprise AI adoption. This powerful containerized solution optimizes performance, observability, and ...

OWASP Top 10 for LLM and new tooling guidance targets GenAl security

New guidance for organizations seeking to protect the generative AI tools they're running has been released by the OWASP Top 10 LLM Applications Security Project. The post OWASP Top 10 for LLM and new tooling guidance targets GenAl security ...

Hot Topic breach: Has your credit card info been compromised?

If you’re wondering whether your personal and financial data has been compromised in the massive Hot Topic breach, you can use two separate online tools to check: Have I Been Pwned? or DataBreach.com. Which data was compromised? News of a ...

Zscaler Zero Trust Segmentation prevents lateral movement from ransomware attacks

Zscaler announced a Zero Trust Segmentation solution to provide a more secure, agile and cost-effective means to connect users, devices, and workloads across and within globally distributed branches, factories, campuses, data centers, and public ...

Transforming Security: How SAST Enhances Your Secure Code Review Process?

Secure coding has become a critical aspect of software development, and the need for effective security testing is at an all-time high. Vulnerabilities in code can expose applications to serious threats, making early detection vital for ...

Software Vulnerability Snapshot Report Findings

Get insights from the Software Vulnerability Snapshot Report, including industry-specific challenges & AppSec recommendations for securing your software. The post Software Vulnerability Snapshot Report Findings appeared first on Blog. The ...

Immersive Labs AI Scenario Generator improves cyber skills against various attack types

Immersive Labs introduced AI Scenario Generator. This new capability enables organizations to generate threat scenarios for crisis simulations to ensure their workforces are ready for the latest threats. By inputting a few short prompts, ...

5 Best Vendor Risk Management Solutions

Discover the 5 best vendor risk management solutions, designed to help you mitigate third-party risks while ensuring compliance. The post 5 Best Vendor Risk Management Solutions appeared first on Scytale. The post 5 Best Vendor Risk Management ...

Eurotech ReliaGATE 15A-14 enables organizations to meet regulatory standards

Eurotech launches ReliaGATE 15A-14, a cybersecure modular edge gateway designed to meet the growing demand for secure, flexible, and globally deployable IoT solutions. Built to support a wide range of applications, the ReliaGATE 15A-14 ...

Massive troves of Amazon, HSBC employee data leaked

A threat actor who goes by the online moniker “Nam3L3ss” has leaked employee data belonging to a number of corporations – including Amazon, 3M, HSBC and HP – ostensibly compromised during the May 2023 MOVEit hack by the ...

The Thales 2024 Data Security Directions Council Report: Digital Sovereignty: Is Your Data Truly Yours?

The Thales 2024 Data Security Directions Council Report: Digital Sovereignty: Is Your Data Truly Yours? madhav Tue, 11/12/2024 - 08:31 Digital sovereignty has emerged as topic of significant interest by both businesses and governments. ...

GUEST ESSAY: The promise and pitfalls of using augmented reality– ‘AR’ — in cybersecurity

Augmented reality use cases have become prevalent in our society. The technology, which first emerged primarily in the world of gaming and entertainment, now promises to reshape our reality with interactive information and immersive experiences. ...

Fraudsters Abuse DocuSign API for Legit-Looking Invoices

  I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters. There is not a technical vulnerability, it comes down to a ...

The changing face of identity security

It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that doesn’t feature them to some degree. Getting ...

Top Mobile Security Risks of 2024 by OWASP

As technology gains popularity, it often attracts more vulnerabilities and becomes a target for cyberattacks. The OWASP Mobile Top 10 is a valuable resource for security researchers and mobile app developers, offering essential data for ...

Evaluating your organization’s application risk management journey

In this Help Net Security interview, Chris Wysopal, Chief Security Evangelist at Veracode, discusses strategies for CISOs to quantify application risk in financial terms. Wysopal outlines the need for continuous risk management practices and ...

Powerpipe: Open-source dashboards for DevOps

Powerpipe is an open-source solution designed to streamline DevOps management with powerful visualization and compliance tools, making it simple to track, assess, and act on key data for smarter decision-making and continuous compliance ...