Application Security News and Articles


Cybersecurity crisis in numbers

The number of US data compromises in 2024 (3,158) decreased 1% compared to 2023 (3,202), 44 events away from tying a record for the number of compromises tracked in a year, according to the Identity Theft Resource Center. Data breach notices ...

SEC and FCA fines: Issues jump

The financial sector faces communication compliance challenges as organizations struggle to maintain oversight across communication channels. Adding to the complexity is the unexpected rise of unconventional platforms, such as Snapchat, used for ...

Only 13% of organizations fully recover data after a ransomware attack

Ransomware attacks are disrupting and undermining business operations and draining revenue streams, according to Illumio. Findings from the study reveal that 58% of organizations had to shut down operations following a ransomware attack, up from ...

AI-Driven Application Security Testing: Boost App Protection

Discover how AI-driven application security testing software enhances accuracy, reduces vulnerabilities, and improves compliance.Continue reading on Medium »

How Compliance Automation Enhances Data Security

The post How Compliance Automation Enhances Data Security appeared first on AI Security Automation. The post How Compliance Automation Enhances Data Security appeared first on Security Boulevard.

Cross-post: Office of the CISO 2024 Year in Review: AI Trust and Security

[written together with Marina Kaganovich, Executive Trust Lead, Office of the CISO @ Google Cloud; originally posted here] In 2024, we shared our insights on how to approach generative AI securely by exploring the fundamentals of this innovative ...

Keeping Your Automated Systems Safe and Secure

Can NHI Management Be the Key to Unlocking Cybersecurity for Automated Systems? Where data is the new oil, we need to continually revisit and beef up our cybersecurity measures to protect crucial information. The rise in automated systems across ...

Improving Secrets Management in Healthcare Systems

Why is Secrets Management Crucial in Healthcare Systems? Have you ever considered how privileged access to digital systems in healthcare organizations can be both a boon and a bane? As more healthcare institutions migrate to cloud-based services, ...

Relax with Top-tier Cloud-Native Security

Could There be a Simpler Way to Enhance Cloud-Native Security? Where maintaining top-tier security is as effortless as sipping a chilled lemonade on a beach. Yes, it may seem unlikely, but it is entirely achievable with the systematic and relaxed ...

Reverse engineering your test data: It’s not as safe as you think it is

Not all approaches to data de-identification and anonymization are created equal. Many approaches leave your data exposed to the very real risk of re-identification. Here's how that can happen and how to avoid it. The post Reverse engineering ...

What is the role of data synthesis in my CI/CD pipeline, anyway?

The short answer? Adding data synthesis to your CI/CD pipeline makes your processes better, faster, and more efficient. The post What is the role of data synthesis in my CI/CD pipeline, anyway? appeared first on Security Boulevard.

DeepSeek: The Silent AI Takeover That Could Cripple Markets and Fuel China’s Cyberwarfare

David Jemmett, CEO & Founder of CISO Global Unlike Western AI systems governed by privacy laws and ethical considerations, DeepSeek operates under a regime notorious for state-sponsored hacking, surveillance, and cyber espionage. With ...

VMware Warns of High-Risk Blind SQL Injection Bug in Avi Load Balancer

VMware warns that a malicious user with network access may be able to use specially crafted SQL queries to gain database access. The post VMware Warns of High-Risk Blind SQL Injection Bug in Avi Load Balancer appeared first on SecurityWeek.

DEF CON 32 – Top War Stories From A TryHard Bug Bounty Hunter

Author/Presenter: Justin Rhynorater Gardner Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; ...

AI is a double-edged sword: Why you need new controls to manage risk

As with just about every part of business today, cybersecurity has been awash in the promises of what AI can do for its tools and processes. In fact, cybersecurity vendors have touted the power of algorithmic detection and response for years. The ...

Prioritizing Cybersecurity Findings Exception and Issues in Risk Management

There is an immediate need for organizations to quickly implement or mature their cyber risk practices, and even more so as the reality of a new era of remote work and other changes settles after being driven by the COVID-19 pandemic. The cyber ...

Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #321 – Use Jira

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Luxshan ...

The Halliburton Cyberattack: A $35M Wake-Up Call

The post The Halliburton Cyberattack: A $35M Wake-Up Call appeared first on Votiro. The post The Halliburton Cyberattack: A $35M Wake-Up Call appeared first on Security Boulevard.

Complete Guide to AI Tokens: Understanding, Optimization, and Cost Management

Discover how to effectively manage and optimize AI tokens for better performance and cost efficiency. This guide covers everything from basic concepts to advanced implementations, including context window management, coding assistant development, ...

DEF CON 32 – Travel Better Expedient Digital Defense

Authors/Presenters: Grey Fox Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...