Application Security News and Articles


The Small Business Guide to Everyday Access Management and Secure Off-boarding

Learn how to secure your company's digital assets in just 10 minutes a day. This practical guide shows small business owners and startup founders how to manage access, respond to security issues, and handle employee departures efficiently—all ...

DEF CON 32 – Attacks On GenAI Data & Using Vector Encryption To Stop Them

Authors/Presenters: Patrick Walsh, Bob Wall Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; ...

Extending SonarQube to Detect and Flag Insecure AI Model Serialization Formats

Many AI models are serialized and stored in various data formats (a prominent example being pickle), which can introduce significant…Continue reading on Medium »

INE Security Alert: Expediting CMMC 2.0 Compliance

Cary, North Carolina, 26th January 2025, CyberNewsWire The post INE Security Alert: Expediting CMMC 2.0 Compliance appeared first on Security Boulevard.

Week in review: 48k Fortinet firewalls open to attack, attackers “vishing” orgs via Microsoft Teams

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 48,000+ internet-facing Fortinet firewalls still open to attack Despite last week’s confirmation of and warnings about long-standing ...

Empower Your DevOps with Robust Secrets Security

Are Your DevOps Truly Secured? As DevOps continue to streamline the software development process, have you considered how secure your practices truly are? An essential part of the answer lies within the realm of Non-Human Identities (NHIs) and ...

Building Trust with Effective IAM Solutions

Why is Trust-Building Paramount in Cybersecurity? Have you considered how much trust we place in our cyber systems daily? It’s a silent bond we form without realizing it. We trust that our online interactions are secure, that our data is ...

Ensuring Data Safety with Comprehensive NHIDR

How Crucial is Comprehensive NHI Management in Ensuring Data Safety? Are we doing all we can to ensure our data’s safety? One answer lies in the comprehensive management of Non-Human Identities (NHIs). As machine identities, these are critical ...

DeepSeek: Revolutionizing AI with Efficiency, Innovation, and Affordability

DeepSeek redefines AI with cutting-edge innovations: MoE architecture activates only 37B parameters/token, FP8 training slashes costs, and latent attention boosts speed. Learn why it delivers GPT-4-level performance at 1/20th the cost, reshaping ...

DEF CON 32 – Access Control Done Right The First Time

Author/Presenter: Tim Clevenger Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

The Cybersecurity Vault Podcast 2024 Recap

  My deepest appreciation to all the incredible cybersecurity luminaries who joined The Cybersecurity Vault podcast last year! Your insights, expertise, and thought-provoking discussions made each episode invaluable for the audience and ...

Reassured Compliance through Secrets Vaulting

Are Your Secrets Safe in the Cloud? In the hustle and bustle of managing data and optimizing systems, one aspect that often gets overlooked is the security of Non-Human Identities (NHIs) and their secrets. These NHIs are machine identities ...

Staying Ahead with Advanced PAM Techniques

Why Should Organizations Prioritize Advanced PAM Techniques? With the increasing number of cyber threats and data breaches, questioning how organizations can stay protected is pivotal. With machine identities – also known as Non-Human ...

Cost-Effective Strategies for Secrets Sprawl

Does Your Organization Have a Handle On Secrets Sprawl? As a seasoned data management expert and cybersecurity specialist, I’ve seen the troubling trend of secrets sprawl growing in various industries. Financial services, healthcare, travel, ...

DEF CON 32 – Anyone Can Hack IoT- Beginner’s Guide To Hacking Your First IoT Device

Author/Presenter: Andrew Bellini Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Did You Hire a Spy? Risks and Strategies for Securing Remote Workers

Former Military Intelligence Agents Turned Cybersecurity Experts at CISO Global In today’s high-stakes digital landscape, hiring remotely requires diligence and vigilance. Trust is important, but verifying that trust is non-negotiable. The ...

Cyber Lingo: What is GRC in cybersecurity?

What is GRC in cybersecurity, and why does it matter? GRC stands for Governance, Risk, and Compliance, a helpful framework that integrates policies, risk management strategies, The post Cyber Lingo: What is GRC in cybersecurity? appeared first ...

Randall Munroe’s XKCD ‘Unit Circle’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Unit Circle’ appeared first on Security Boulevard.

Continuous Monitoring Guide: FedRAMP Meets Zero Trust

Security isn’t something you implement once and leave alone. It’s a mindset, an operation, and an ongoing policy. Security frameworks like FedRAMP require a process called continuous monitoring in order to remain valid. The world of ...

How to Choose the Right Cybersecurity Software: A Comprehensive Guide

Navigate the complex world of cybersecurity software selection with confidence. This practical guide helps business leaders understand modern security threats, evaluate solutions, and implement effective protection strategies. The post How to ...