Application Security News and Articles


Updated Response to CISA Advisory (AA23-136A): #StopRansomware: BianLian Ransomware Group

AttackIQ has released an updated attack graph in response to the recently revised CISA Advisory (AA23-136A) that disseminates known BianLian ransomware group Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) ...

White House Executive Order: Strengthening and Promoting Innovation in the Nation’s Cybersecurity

Get details on this new cybersecurity Executive Order and its implications.  The post White House Executive Order: Strengthening and Promoting Innovation in the Nation’s Cybersecurity appeared first on Security Boulevard.

Debunking the “On Premise Software” Myth | Grip Security

Discover why relying on on premise software hinders innovation and explore how shifting employee behavior is driving modern SaaS adoption and usage trends. The post Debunking the “On Premise Software” Myth | Grip Security appeared ...

Veriti mentioned as a Tech Innovator in the 2025 Gartner® Emerging Tech: Tech Innovators in Preemptive Cybersecurity Report in the Preemptive Cybersecuirty Category. 

We are thrilled to announce that Veriti has been mentioned in the 2025 Gartner Emerging Tech: Tech Innovators in Preemptive Cybersecurity as a Tech Innovator in the Preemptive Cybersecurity category. We hold the view that this mention underscores ...

Simplifying Compliance in the Complex U.S. FinServ Regulatory Landscape

Simplifying Compliance in the Complex U.S. FinServ Regulatory Landscape andrew.gertz@t… Thu, 01/16/2025 - 16:30 Compliance Thales | Cloud Protection & Licensing Solutions More About This Author > If you work ...

How a Large Healthcare Company Slashed Their Secrets Incidents by Half

Learn how one of Europe's largest healthcare tech leaders transformed their Secrets Security with GitGuardian, cutting incidents by half without compromising developer productivity. The post How a Large Healthcare Company Slashed Their Secrets ...

DEF CON 32 – Small Satellite Modeling and Defender Software

Author/Presenter: Kyle Murbach Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Smart Spatial and Hyperview Unite to Take Data Centers to the Next Level

This strategic partnership combines Smart Spatial's innovative digital twin platform with Hyperview's expertise in data center optimization, enabling businesses to achieve sustainability, operational efficiency, and proactive management ...

Cyberpsychology: The Mind Behind the Screen

How does the mind react when people interact with technology? A question often asked but seldom answered. It was a Monday afternoon, the last day of our sales quarter, and amidst the tense air, a message popped up on the screen. It was a Purchase ...

A Deep Dive into ISO 27001 Password Requirements

Explore ISO 27001 password requirements to ensure ISO 27001 compliance and strengthen your overall security posture. The post A Deep Dive into ISO 27001 Password Requirements appeared first on Scytale. The post A Deep Dive into ISO 27001 Password ...

New Cybersecurity Executive Order: What It Means for Federal Agencies

The Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity includes guidance on third-party risk management and the need to adopt proven security practices to gain visibility of security threats across network ...

Critical SimpleHelp vulnerabilities fixed, update your server instances!

If you’re an organization using SimpleHelp for your remote IT support/access needs, you should update or patch your server installation without delay, to fix security vulnerabilities that may be exploited by remote attackers to execute code ...

Concentric AI helps organizations gain a complete understanding of their data

Concentric AI introduced new Private Scan Manager functionality in its Semantic Intelligence data security governance platform, which enables data scans to be processed within organizations’ own environments. Highly regulated organizations, ...

Day Zero is a Day Too Late: The Real Cost of Reactive Security Tools

The post Day Zero is a Day Too Late: The Real Cost of Reactive Security Tools appeared first on Votiro. The post Day Zero is a Day Too Late: The Real Cost of Reactive Security Tools appeared first on Security Boulevard.

Network Detection and Response (NDR) Done Right from the Ground Up

With an NDR in place, your IT administrators can quickly detect anomalies on the network, from cyberattacks to malfunctioning application servers or network equipment. The post Network Detection and Response (NDR) Done Right from the Ground Up ...

What is an Uncensored Model and Why Do I Need It

While the power and potential of GenAI is evident for IT and security, the use cases in the security field are surprisingly immature largely due to censorship and guardrails that hamper many models’ utility for cybersecurity use ...

Top Digital Tools for the Classroom

Digital tools are reshaping the traditional K-12 learning experience, unleashing a wave of benefits in the process. This guide explores the significance of digital tools for the classroom and how they can support your school district in creating ...

Contrast Security AVM identifies application and API vulnerabilities in production

Contrast Security released Application Vulnerability Monitoring (AVM), a new capability of Application Detection and Response (ADR). AVM works within applications to find application and API vulnerabilities in production and correlate those ...

Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?

A threat actor has leaked configuration files (aka configs) for over 15,000 Fortinet Fortigate firewalls and associated admin and user credentials. The collection has been leaked on Monday and publicized on an underground forum by the threat ...

Best AutoSPF Alternatives: Detailed Feature Comparison

Discover top AutoSPF alternatives for dynamic SPF flattening and better email deliverability with advanced features and pricing. The post Best AutoSPF Alternatives: Detailed Feature Comparison appeared first on Security Boulevard.