Application Security News and Articles


Simplify SaaS Security: How Posture Scoring Empowers Teams to Optimize SSPM

Learn about AppOmni’s new Posture Scoring which simplifies SaaS security management using a clear, actionable 0-100 scoring scale. The post Simplify SaaS Security: How Posture Scoring Empowers Teams to Optimize SSPM appeared first on ...

Encryption Consulting enhances CodeSign Secure platform

Encryption Consulting announced significant updates to its CodeSign Secure platform, a comprehensive code-signing solution designed to address the challenges of software security in modern development environments. As organizations prioritize ...

Drata to Acquire SafeBase in $250 Million Deal

Security and compliance automation firm Drata has acquired trust center platform SafeBase in a quarter billion dollar deal. The post Drata to Acquire SafeBase in $250 Million Deal appeared first on SecurityWeek.

Ivanti, Fortinet Patch Remote Code Execution Vulnerabilities

Ivanti and Fortinet on Tuesday released patches for multiple critical- and high-severity vulnerabilities in their products. The post Ivanti, Fortinet Patch Remote Code Execution Vulnerabilities appeared first on SecurityWeek.

Best SAST Tools for Golang

Today, in our organization, I wanted to set up SAST tools and build the best pipeline for an infrastructure that heavily relies on Golang.Continue reading on Medium »

GAO Tells Coast Guard to Improve Cybersecurity of Maritime Transportation System

A new GAO report assesses that the Coast Guard needs to improve Maritime Transportation System (MTS) cybersecurity. The post GAO Tells Coast Guard to Improve Cybersecurity of Maritime Transportation System appeared first on SecurityWeek.

Nametag Adds Ability to Verify Identity of New Remote Workers

Nametag extended its identity verification platform enabling organizations to verify the identity of a remote worker they are considering. The post Nametag Adds Ability to Verify Identity of New Remote Workers appeared first on Security Boulevard.

Chipmaker Patch Tuesday: Intel, AMD, Nvidia Fix High-Severity Vulnerabilities

Chipmakers Intel, AMD and Nvidia on Tuesday published new security advisories to inform customers about vulnerabilities found in their products.  The post Chipmaker Patch Tuesday: Intel, AMD, Nvidia Fix High-Severity Vulnerabilities appeared ...

Cisco Says Ransomware Group’s Leak Related to Old Hack

A fresh post on the Kraken ransomware group’s leak website refers to data stolen in a 2022 cyberattack, Cisco says. The post Cisco Says Ransomware Group’s Leak Related to Old Hack appeared first on SecurityWeek.

CISOs Brace for LLM-Powered Attacks: Key Strategies to Stay Ahead  

For chief information security officers (CISOs), understanding and mitigating the security risks associated with LLMs is paramount.  The post CISOs Brace for LLM-Powered Attacks: Key Strategies to Stay Ahead   appeared first on Security Boulevard.

Webinar recap: The security mistakes everyone makes in M&A

Discover exactly how to avoid the common security pitfalls during M&A from our panel of experts, who are drawing from decades of experience in the field. The post Webinar recap: The security mistakes everyone makes in M&A appeared first ...

In Defense of Oversight – The President and the PCLOB

In late January 2025, President Trump fired the Democratically (big D) appointed members of the Privacy and Civil Liberties Oversight Board (PCLOB), an independent watchdog entity designed to provide input and oversight to the Intelligence ...

The Future of Automation in Cybersecurity

The future of cybersecurity is not about choosing between AI and human expertise, but rather how to harness both to create a more secure digital world.  The post The Future of Automation in Cybersecurity appeared first on Security Boulevard.

Navigating Security Challenges in the Age of Data Complexity 

Organizations need to embrace the transformative powers of AI but do so with a vigilant eye toward the data security and privacy challenges it presents. The post Navigating Security Challenges in the Age of Data Complexity  appeared first on ...

ICS Patch Tuesday: Vulnerabilities Addressed by Schneider Electric, Siemens

Industrial giants Schneider Electric and Siemens have released February 2025 Patch Tuesday ICS security advisories. The post ICS Patch Tuesday: Vulnerabilities Addressed by Schneider Electric, Siemens appeared first on SecurityWeek.

Thales launches OneWelcome FIDO Key Lifecycle Management

Thales launched OneWelcome FIDO Key Lifecycle Management, a new solution to help large organizations successfully deploy and manage FIDO security passkeys at scale. OneWelcome FIDO Key Lifecycle Management combines an interoperable management ...

Armor Nexus reduces an organization’s attack surface

Armor unveiled Nexus, a platform designed to provide transparency, proactive risk reduction, and intelligent support for large, complex organizations to ensure an adaptable, comprehensive, and unified cybersecurity strategy. With Nexus, Armor ...

Thales unveils OneWelcome FIDO Key Management for scalable passkey security

Thales has announced the launch of OneWelcome FIDO Key Lifecycle Management, a new solution to help large organizations successfully deploy and manage FIDO security passkeys at scale. OneWelcome FIDO Key Lifecycle Management combines an ...

EchoMark’s API detects, investigates, and identifies the source of data leaks

EchoMark launched its new API. The API seamlessly integrates EchoMark’s watermarking and leak detection capabilities directly into workflows and applications, protecting sensitive information without disrupting current operations. EchoMark ...

Stolen Information Used in Personalized Immigration-Themed Attack

Stolen Information Used in Personalized Immigration-Themed Attack  The post Stolen Information Used in Personalized Immigration-Themed Attack appeared first on Security Boulevard.