Application Security News and Articles
A new GAO report assesses that the Coast Guard needs to improve Maritime Transportation System (MTS) cybersecurity.
The post GAO Tells Coast Guard to Improve Cybersecurity of Maritime Transportation System appeared first on SecurityWeek.
Nametag extended its identity verification platform enabling organizations to verify the identity of a remote worker they are considering.
The post Nametag Adds Ability to Verify Identity of New Remote Workers appeared first on Security Boulevard.
Chipmakers Intel, AMD and Nvidia on Tuesday published new security advisories to inform customers about vulnerabilities found in their products.
The post Chipmaker Patch Tuesday: Intel, AMD, Nvidia Fix High-Severity Vulnerabilities appeared ...
A fresh post on the Kraken ransomware group’s leak website refers to data stolen in a 2022 cyberattack, Cisco says.
The post Cisco Says Ransomware Group’s Leak Related to Old Hack appeared first on SecurityWeek.
For chief information security officers (CISOs), understanding and mitigating the security risks associated with LLMs is paramount.
The post CISOs Brace for LLM-Powered Attacks: Key Strategies to Stay Ahead appeared first on Security Boulevard.
Discover exactly how to avoid the common security pitfalls during M&A from our panel of experts, who are drawing from decades of experience in the field.
The post Webinar recap: The security mistakes everyone makes in M&A appeared first ...
In late January 2025, President Trump fired the Democratically (big D) appointed members of the Privacy and Civil Liberties Oversight Board (PCLOB), an independent watchdog entity designed to provide input and oversight to the Intelligence ...
The future of cybersecurity is not about choosing between AI and human expertise, but rather how to harness both to create a more secure digital world.
The post The Future of Automation in Cybersecurity appeared first on Security Boulevard.
Organizations need to embrace the transformative powers of AI but do so with a vigilant eye toward the data security and privacy challenges it presents.
The post Navigating Security Challenges in the Age of Data Complexity appeared first on ...
Industrial giants Schneider Electric and Siemens have released February 2025 Patch Tuesday ICS security advisories.
The post ICS Patch Tuesday: Vulnerabilities Addressed by Schneider Electric, Siemens appeared first on SecurityWeek.
Thales launched OneWelcome FIDO Key Lifecycle Management, a new solution to help large organizations successfully deploy and manage FIDO security passkeys at scale. OneWelcome FIDO Key Lifecycle Management combines an interoperable management ...
Armor unveiled Nexus, a platform designed to provide transparency, proactive risk reduction, and intelligent support for large, complex organizations to ensure an adaptable, comprehensive, and unified cybersecurity strategy. With Nexus, Armor ...
Thales has announced the launch of OneWelcome FIDO Key Lifecycle Management, a new solution to help large organizations successfully deploy and manage FIDO security passkeys at scale. OneWelcome FIDO Key Lifecycle Management combines an ...
EchoMark launched its new API. The API seamlessly integrates EchoMark’s watermarking and leak detection capabilities directly into workflows and applications, protecting sensitive information without disrupting current operations. EchoMark ...
Stolen Information Used in Personalized Immigration-Themed Attack
The post Stolen Information Used in Personalized Immigration-Themed Attack appeared first on Security Boulevard.
Organizations’ increasing reliance on third-party software and services has created an environment with more vulnerabilities and harder-to-detect risks. Attackers know they can increase efficiency and profitability by compromising the supply ...
SysReptor is a customizable open-source penetration testing reporting platform built for pentesters, red teamers, and cybersecurity professionals. You can optimize your workflow by simplifying, automating, and personalizing your reports. ...
The breaches and ransomware attacks of 2024 highlighted systemic vulnerabilities, demonstrating how third-party and fourth-party dependencies amplify risks across industries, according to a Black Kite report. Researchers revealed how silent ...
While 4 out of 5 CEOs recognize AI’s potential, many worry gaps in their understanding will impact strategic decisions, risking missed opportunities and falling behind competitors, according to Cisco. Yet, CEOs are not standing still. With ...
On the eve of the Munich Security Conference, Google argues that the cybercriminal threat should be treated as a national security threat like state-backed hacking groups.
The post Cybercrime Threatens National Security, Google Threat Intel Team ...