Application Security News and Articles


BreachRx Brings Generative AI to Security Incident Management

BreachRx this week added generative artificial intelligence (GenAI) capabilities to a security incident platform that promises to streamline workflows across all the stakeholders that need to collaborate. The post BreachRx Brings Generative AI to ...

How Does FCPA Compliance Impact Your Business

Enacted in 1977, the Foreign Corrupt Practices Act (FCPA) was designed to curb corruption by prohibiting U.S. companies, subsidiaries, and representatives from offering bribes to foreign officials to gain or retain business. What began as a ...

How to prevent data leakage in collaboration tools like Slack and Teams

In recent years, collaboration tools have become an absolute necessity for remote and hybrid work. This primarily increased during the COVID-19 pandemic due to the impossibility of communicating in person. So, tools like Slack, Microsoft Teams, ...

The CISO’s bookshelf: 10 must-reads for security leaders

Discover essential reads for CISOs in this curated list of books covering cybersecurity leadership, risk management, zero trust, board communication, and more. Why CISOs Fail, 2nd Edition Author: Barak Engel Barak Engel expands on the ideas from ...

89% of enterprise AI usage is invisible to the organization

Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections to GenAI tools are done using personal non-corporate accounts. Among logins using corporate accounts, 58% of ...

How Unified SSO reduces complexity and enhances security

Large enterprises operate complex IT environments, balancing legacy on-premises applications with modern cloud services. Over time, they have accumulated multiple identity providers (IDPs) like Microsoft Entra ID, Okta, and Ping Identity to ...

What are the latest trends in NHI protection for CIOs?

Are CIOs Prepared for the Rising NHI Trends? When the cloud environment evolves to deliver seamless business solutions, it brings along unique challenges in terms of data security. Needless to say, managing Non-Human Identities (NHIs) has become ...

What are the risks of unmanaged NHIs in enterprise environments?

Are Unmanaged Non-Human Identities (NHIs) Jeopardizing Your Enterprise Environment? With cloud-native applications, AI technologies, and IoT devices permeating modern enterprises, Non-Human Identities (NHIs) have become critical components. But ...

How can executive teams ensure NHI compliance with industry standards?

Why is Compliance Crucial for Non-Human Identities? Executive teams often face an array of complex challenges. One such challenge concerns Non-Human Identities (NHIs) compliance. So, why is it essential to get this right? Non-Human Identities are ...

Building a Shield of Defensibility: How CISOs Can Protect Their Careers and Organizations

In today’s fast-evolving regulatory landscape, Chief Information Security Officers (CISOs) are under immense pressure. With increasing legal scrutiny, evolving SEC regulations, and rising personal liability concerns, CISOs must take ...

PowerSchool Hack; Takedowns and Arrests and Leaks, Oh My!; and ITRC Breach Report Findings 

There’s been quite a few hacks, takedowns-arrests-leaks, and insights from the Identity Theft Resource Center (ITRC) 2024 Breach Report.  Dive into the most pressing recent stories on data leaks, cybercrime, and the dark web with security ...

Ransomware Attack Ends a 150 Year Company

  Knights of Old, a 150-year-old UK company, is gone – due to a cyberattack! This terribly unfortunate event is a good example of how cybersecurity matters to every company that depends on digital technology - even if it is to run your books ...

DEF CON 32 – War Stories – Stranger In A Changed Land

Author/Presenter: Tony Sage Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

US Indicts China’s iSoon ‘Hackers-for-Hire’ Operatives 

i-Soon employees charged with conducting extensive hacking campaigns on behalf of Beijing’s security services. The post US Indicts China’s iSoon ‘Hackers-for-Hire’ Operatives  appeared first on SecurityWeek.

Apple vs. UK — ADP E2EE Back Door Faceoff

Won’t Tim Think of the Children? End-to-end encryption battle continues. The post Apple vs. UK — ADP E2EE Back Door Faceoff appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘RNA’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘RNA’ appeared first on Security Boulevard.

Anti-detect browser analysis: How to detect the Undetectable browser?

This is the second article of our series about anti-detect browsers. In the first article, we gave an overview of anti-detect browsers, their main features and what they’re used for. In this second article, we do a deep dive into Undetectable, ...

Fueling the Fight Against Identity Attacks

When we founded SpecterOps, one of our core principles was to build a company which brought unique insight into high-capability adversary tradecraft, constantly innovating in research and tooling. We aspired to set the cadence of the cyber ...

SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform 

SpecterOps has raised an unusually large $75 million Series B funding round to accelerate the growth of its BloodHound Enterprise platform.  The post SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform  appeared first on ...

7 container security best practices

Properly securing containers has never been easy, but the rise of software supply chain attacks — and new threats coming from AI — makes additional security controls essential. Threats and risks must be identified and addressed before ...