Application Security News and Articles


The Top 9 Cyber Risk Management Trends in 2025 | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post The Top 9 Cyber Risk Management Trends in 2025 | Kovrr appeared first on Security Boulevard.

United States of America Veterans Day 2024

The Veterans Day National Committee (VDNC) chose the winner of this years' 2024 Veteran's Day Poster Contest in a 2024 mid-year time frame). The winner was chosen, and Myisha Godette, a retired, and Disabled Army Veteran, has been honored (and ...

MY TAKE: Technology breakthroughs, emerging standards are coalescing to assure IoT integrity

The Internet of Things is growing apace. Related: The Top 12 IoT protocols Deployment of 5G and AI-enhanced IoT systems is accelerating. This, in turn, is driving up the number of IoT-connected devices in our homes, cities, transportation systems ...

November 2024 Patch Tuesday forecast: New servers arrive early

Microsoft followed their October precedent set with Windows 11 24H2 and announced Microsoft Server 2025 on the first of November. We were expecting the official announcement at Microsoft Ignite near the end of the month, but with the early ...

4 reasons why veterans thrive as cybersecurity professionals

Through their past military service, veterans are trained to think like adversaries, often share that mission-driven spirit and excel when working with a team to achieve a larger goal. They develop and champion the unique traits that ...

Strategies for CISOs navigating hybrid and multi-cloud security

In this Help Net Security interview, Alex Freedland, CEO at Mirantis, discusses the cloud security challenges that CISOs need to tackle as multi-cloud and hybrid environments become the norm. He points out the expanded attack surfaces, the ...

Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password

In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election outcomes while exploring the rise of ...

Setting a security standard: From vulnerability to exposure management

Vulnerability management has been the standard approach to fending off cyber threats for years. Still, it falls short by focusing on a limited number of vulnerabilities, often resolving only 1% to 20% of issues. In 2024, with the average data ...

How human ingenuity continues to outpace automated security tools

10% of security researchers now specialize in AI technology as 48% of security leaders consider AI to be one of the greatest risks to their organizations, according to HackerOne. HackerOne’s report combines perspectives from the researcher ...

NIST Updated Standards for a Secure Password

Your internet account passwords are probably among the most guarded pieces of information you retain in your brain. With everything that has recently migrated to the digital realm, a secure password functions as the deadbolt to your private ...

DEF CON 32 – SQL Injection Isn’t Dead Smuggling Queries at the Protocol Level

Authors/Presenters: Paul Gerste Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Week in review: Zero-click flaw in Synology NAS devices, Google fixes exploited Android vulnerability

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Millions of Synology NAS devices vulnerable to zero-click attacks (CVE-2024-10443) Synology has released fixes for an unauthenticated ...

Go Without MFA or Data Backups: Which is Worse? | Grip

Faced with a critical system failure, would you choose a month without MFA or data backups? Explore the consequences of each in this risk management exercise. The post Go Without MFA or Data Backups: Which is Worse? | Grip appeared first on ...

Extend ServiceNow ITSM to Manage Shadow SaaS Risk | Grip

See how the Grip-ServiceNow integration enhances ITSM by identifying and managing shadow SaaS, reducing costs, boosting efficiency, and strengthening security. The post Extend ServiceNow ITSM to Manage Shadow SaaS Risk | Grip appeared first on ...

DDoS Attacks Targeting ISPs are Different – Here’s How

ISPs face a few unique challenges and risks when it comes to DDoS attacks. Their size and complexity make them bigger targets for hackers, while their unique structural features require more tailored defenses.   ISPs can be both direct targets ...

The 249th United States Marine Corps Birthday: A Message From The Commandant Of The Marine Corps

MARINE CORPS BIRTHDAY CONTENTDate Signed: 10/25/2024MARADMINS Number: 511/24 MARADMINS : 511/24R 231936Z OCT 24 MARADMIN 511/24 MSGID/GENADMIN/CMC CD WASHINGTON DC// SUBJ/MARINE CORPS BIRTHDAY CONTENT// POC/J.MERCURE/CAPT/CMC CD WASHINGTON ...

Comprehensive Guide to Static Application Security Testing (SAST)

Hello, Hackers! My name is Madhurendra — I’m a security researcher and experienced information security consultant.Continue reading on Medium »

Montana Consumer Data Protection Act

What is the Montana Consumer Data Protection Act (MTCDPA)? The Montana Consumer Data Privacy Act (MTCDPA), which became effective on October 1, 2024, introduces a series of data privacy rights for Montana residents and compliance obligations for ...

Tennessee Information Protection Act

What is the Tennessee Information Protection Act (TIPA)? The Tennessee Information Protection Act (TIPA), effective July 1, 2025, is a state-level data privacy law that regulates how companies manage and protect consumers’ personal data within ...

 Delaware Personal Data Privacy Act (DPDPA)

What is the Delaware Personal Data Privacy Act (DPDPA)? The Delaware Personal Data Privacy Act (DPDPA) is a state law created to protect the privacy of Delaware residents by regulating the collection, use, storage, and sharing of personal data by ...