Application Security News and Articles


How to Train AI Dragons to Solve Network Security Problems

Exploring how AI can help service providers and cloud builders keep their networks secure and why “feeding your AI dragons” with relevant, high-quality data is essential for implementing AI for DDoS security.  The post How to Train AI ...

Clutch Security Raises $20 Million for Non-Human Identity Protection Platform

Clutch Security has raised $20 million in a Series A funding round led by SignalFire to secure non-human identities. The post Clutch Security Raises $20 Million for Non-Human Identity Protection Platform appeared first on SecurityWeek.

5 Steps to a Secure and Streamlined SASE Rollout

A secure access service edge (SASE) solution offers the promise of a unified and cost-effective approach to modern networking: Enhancing security, performance and scalability to meet dynamic business needs. The post 5 Steps to a Secure and ...

Platformization is key to reduce cybersecurity complexity

Organizations are facing security complexity challenges as they juggle an average of 83 different security solutions from 29 vendors, according to a report by IBM and Palo Alto Networks. It also shows 7 out of 10 surveyed companies with a high ...

Nine out of ten emails are spam

Now, more than ever, users can fall prey to word-perfect AI-created phishing campaigns, subtle BEC messages that sound remarkably like the sender, and highly convincing ploys from trusted vendors with legitimate-looking websites and clean ...

Infosec products of the month: January 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Absolute Security, Atsign, authID, BackBox, BioConnect, BitSight, BreachLock, Cisco, Commvault, Compliance Scorecard, DataDome, Hiya, IT-Harvest, ...

The Undercurrent Behind the Rise of DeepSeek: DDoS Attacks in the Global AI Technology Game

Background The rise of DeepSeek is undoubtedly a milestone in the development of AI technology in China. As a representative AI enterprise, DeepSeek has not only made breakthrough progress in technological innovation and commercial application, ...

Healthcare Crisis Emerges: Cybersecurity Vulnerabilities in Patient Monitors Confirmed by FDA

  For over a decade, we warned the healthcare industry this was coming. They ignored us. Their sole focus was HIPAA compliance — checking regulatory boxes rather than securing critical systems. We told them that system and service ...

Trump Administration Faces Security Balancing Act in Borderless Cyber Landscape

What challenges will the new administration face and what might President Trump’s record on cybersecurity indicate about the likely approach in 2025 and beyond? The post Trump Administration Faces Security Balancing Act in Borderless Cyber ...

2025 predictions: Security industry

The pace of change in the technology industry has never been faster, and 2025 will be no exception. As businesses adapt to new threats, regulatory pressures, and AI-driven innovations, security and software development teams will need to rethink ...

Preparing for PCI DSS 4.0: How Sonatype SBOM Manager can streamline and accelerate your transition

Payment Card Industry Data Security Standard (PCI DSS) was developed to strengthen payment account data security and standardize globally the necessary security controls. The transition from PCI DSS 3.2.1 and earlier versions to v4.0 involves ...

Advancing Cloud Compliance with Proactive Measures

How Can Proactive Measures Enhance Cloud Compliance? Advancements in digital security manifest as a double-edged sword. While they provide efficient tools to safeguard sensitive data, they concurrently create complex cybersecurity challenges. ...

Innovative PAM Strategies for Modern Enterprises

How Essential are Innovative PAM Strategies for Modern Enterprises? Where technology advances at an unprecedented rate, a question emerges for modern businesses: How pivotal are innovative Privileged Access Management (PAM) strategies for your ...

Trust in Cloud Security with Effective Secrets Rotation

How Critical is Secrets Rotation in Building Trust in Cloud Security? Are you aware that proper management of Non-Human Identities (NHIs) and Secrets is a cornerstone of robust cloud security? Indeed, incorporating effective secrets rotation in ...

Hiya AI Phone App Protects Against Deepfakes, Other Scams

Mobile security solutions company Hiya is rolling out its Hiya AI Phone app that uses trained AI models to smoke out deepfakes and other mobile scams and alerts the user to the potential threat. In addition, it will automatically transcribes and ...

Justice Department Sues to Block $14 Billion Juniper Buyout by Hewlett Packard Enterprise

The lawsuit said that the combination of businesses would eliminate competition, raise prices and reduce innovation. The post Justice Department Sues to Block $14 Billion Juniper Buyout by Hewlett Packard Enterprise appeared first on SecurityWeek.

DEF CON 32 – Color Blasted Badge Making: How Hard Could It Be

Authors/Presenters: Abhinav Panda, Bradán Lane Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

2025’s Top Five Trends in Identity Verification

Identity verification has emerged as a key component of modern enterprise security as rules tighten and cyber threats, increasingly powered by AI, grow in volume and effectiveness. Emerging technology, changing attack patterns, and new ...

Next Steps from the PCI Council’s SAQ-A Update: Critical Responsibilities and Opportunities for PSPs

by Source Defense The PCI Council’s recent update to SAQ-A merchant requirements will spark questions and confusion across the eCommerce ecosystem. Under the changes, SAQ-A merchants will no longer have to specifically follow requirements 6.4.3 ...

Assessing the New SAQ-A Changes: Insights for QSAs

by Source Defense The PCI Security Standards Council’s recent update to SAQ-A merchant eligibility and compliance requirements introduces significant changes with just weeks to go before the March 31st deadline for 6.4.3 and 11.6.1…shocker. ...