Application Security News and Articles


Build Confidence with Robust Machine Identity Solutions

How Robust Are Your Machine Identity Solutions? As cybersecurity threats and data breaches continue to soar, the question becomes inevitable: how robust are your machine identity solutions? For many organizations, the answer remains shrouded in ...

DEF CON 32 – A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth

Authors/Presenters: Pete Stegemeyer Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

How to Move from Manual to Certificate Automation with ACME

For IT teams, managing certificates can feel like a relentless cycle of tracking expiration dates, renewing certificates, and monitoring CA chains. Without automation, it’s easy to miss renewals, leading to costly outages and downtime. As your ...

How to Motivate Employees and Stakeholders to Encourage a Culture of Cybersecurity

Cybersecurity impacts us all. Third parties process and handle data every day, whether they’re tapping your phone to pay via near-field communication (NFC) or processing a transaction while you pay your utility bill online. The importance of ...

Microsoft Adds Raft of Zero-Trust Tools and Platforms

Microsoft this week launched a raft of cybersecurity initiatives that address everything from making Windows platforms more secure to adding platforms that are more secure by design. The post Microsoft Adds Raft of Zero-Trust Tools and Platforms ...

Securing the Software Supply Chain: Checkmarx One Expands its Offerings

The software supply chain is under siege. Threat actors increasingly exploit weaknesses in code repositories, dependencies and mismanaged secrets to infiltrate and disrupt software development processes. In response, organizations are turning to ...

Shift Left and Shift Up Workload Attack Surface Protection

In today’s security landscape, the concept of a hardened perimeter is increasingly insufficient. With the rise of hybrid and multi-cloud environments, lateral movement attacks, where attackers move through internal systems once a breach has ...

Empower Your Security with Advanced IAM Features

Why Embrace Advanced IAM Features? The world is witnessing a major shift to cloud-based operations, leading to a surge in non-human identities (NHIs) such as bots, service accounts, and APIs. These non-human entities can pose significant threats ...

Randall Munroe’s XKCD ‘Kedging Cannon’

via the comic humor & dry wit of Randall Munroe, creator of XKCD The post Randall Munroe’s XKCD ‘Kedging Cannon’ appeared first on Security Boulevard.

Azure Key Vault Tradecraft with BARK

Brief This post details the existing and new functions in BARK that support adversarial tradecraft research relevant to the Azure Key Vault service. The latter part of the post shows an example of how a red team operator may use these commands ...

Microsoft Veeps Ignite Fire Under CrowdStrike

BSODs begone! Redmond business leaders line up to say what’s new in Windows security. The post Microsoft Veeps Ignite Fire Under CrowdStrike appeared first on Security Boulevard.

Fairwinds Insights Release Notes 16.1.11 – 16.2.4: CVE Mapping Updates

Over the last few months, we’ve been working on making a number of meaningful updates to Fairwinds Insights. We’ve delivered some great new functionality that our Insights customers will definitely benefit from. One of the biggest ...

CISOs Look to Establish Additional Leadership Roles

According to an IANS survey of more than 800 CISOs, roles such as business information security officers (BISOs), chiefs of staff and heads for privacy, program management and data protection are among the top positions being considered to ...

Modern Cyber Attacks: Understanding the Threats and Building Robust Defenses

Cyber attacks are more sophisticated than ever, from ransomware and phishing to DDoS attacks. This post explores these threats and provides actionable insights into building robust defenses. Learn how to implement security best practices and ...

Black Friday Scammers are Hard at Work: Security Experts

Scammers are using everything from fraudulent deals and fake ads to spoofed websites and brand impersonation to target online shoppers who are gearing up for Black Friday as the holiday buying season gets underway, according to cybersecurity ...

GitHub Secure Open Source Fund: Project maintainers, apply now!

GitHub is calling on maintainers of open source projects to apply for the newly opened Secure Open Source Fund, to get funding and knowledge to improve the security and sustainability of their software. The program is funded by companies (AmEx ...

Oracle Linux 9 Update 5 brings security updates, OpenJDK 17, .NET 9.0

Oracle Linux offers a secure, streamlined platform for deploying and managing applications across on-premises, cloud, and edge environments. Designed for demanding workloads, it includes tools for automation, virtualization, high availability, ...

Quantum DXi9200 helps organizations manage and reduce cybersecurity risks

Quantum announces the DXi9200, the latest generation of its flagship DXi9000 Series hybrid (flash + dense disk) data protection appliances, designed for scalable, efficient backup and recovery services for large organizations. With the continuing ...

Strengthening Supply Chains: ReversingLabs Now Integrates with ServiceNow

In today’s rapidly evolving digital landscape, ensuring the security of your software supply chain is more critical than ever. At ReversingLabs, we are excited to announce our latest integration with ServiceNow, designed to provide ...

Prioritize Like Your Organization Depended On It 

Introduction  Identifying vulnerabilities is just the first step in exposure management. The real challenge lies in determining which ones matter most and addressing them without wasting resources or disrupting operations. With cyber threats ...