Application Security News and Articles


Gartner Report: How to Respond to the Threat Landscape in a Volatile, Complex and Ambiguous World

Refine your cybersecurity strategies to navigate the challenges of a VUCA (volatility, uncertainty, complexity, and ambiguity) environment. The post Gartner Report: How to Respond to the Threat Landscape in a Volatile, Complex and Ambiguous World ...

PCI DSS v4.0.1 Changes | Application Security PCI Compliance Requirements | Contrast Security

The deadline to comply with the latest version of the Payment Card Industry Data Security Standard (PCI DSS), v4.0.1, is rapidly approaching: March 31, 2025. Are you prepared? The post PCI DSS v4.0.1 Changes | Application Security PCI Compliance ...

Carahsoft to Host Webinar on Ensuring ICAM Survivability for Access in Disconnected, Degraded, Intermittent, and Low-Bandwidth (DDIL) Environments

MEDIA ADVISORY Strata Identity, Saviynt, and Oxford Computer Group to Present Strategies for Identity Continuity at the Tactical Edge BOULDER, Colo., Nov. 5, 2024 — Strata Identity, the Identity Orchestration company, today announced Carahsoft ...

DEF CON 32 – The Edges Of Surveillance System And Its Supply Chain

Authors/Presenters: Chanin Kim, Myounghun Pak Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; ...

Misinformation is Ruining our Elections. Here’s How we can Rescue Them.

As the 2024 U.S. Presidential Election approaches, along with other pivotal elections worldwide, the online spread of misinformation is reaching new heights. The post Misinformation is Ruining our Elections. Here’s How we can Rescue Them. ...

How to Reduce Risk From Developer Permissions Sprawl

Get steps to prevent risky permissions sprawl in your SDLC.  The post How to Reduce Risk From Developer Permissions Sprawl appeared first on Security Boulevard.

How to Get a SOC 3 Report: 4 Easy Steps 

Learn how to get a SOC 3 report in 4 easy steps and boost your SaaS business’s credibility, customer trust, and competitive edge. The post How to Get a SOC 3 Report: 4 Easy Steps  appeared first on Scytale. The post How to Get a SOC 3 Report: ...

Millions of Synology NAS devices vulnerable to zero-click attacks (CVE-2024-10443)

Synology has released fixes for an unauthenticated “zero-click” remote code execution flaw (CVE-2024-10443, aka RISK:STATION) affecting its popular DiskStation and BeeStation network attached storage (NAS) devices. About ...

Wild, Weird, and Secure: SecureWV 2024’s Cryptid-Themed Conference

Discover how SecureWV 2024 combined local folklore with cutting-edge security insights, featuring talks on threat modeling, defense strategies, and team collaboration. The post Wild, Weird, and Secure: SecureWV 2024’s Cryptid-Themed ...

How to Detect Session Hijacking in Your SaaS Applications

In part 3 of this series, Justin Blackburn shares best practices to detect session hijacking and how AppOmni does this by flagging anomalies and through UEBA alerts. The post How to Detect Session Hijacking in Your SaaS Applications appeared ...

Fallout from the Change Healthcare Breach, Mortgage Wire Fraud What You Need To Know

In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and ...

What is Enterprise Compliance and Why is It Important?

In today’s fast-paced business world, companies juggle numerous responsibilities—from meeting customer demands to navigating complex regulations. One crucial area that’s often misunderstood but incredibly important is enterprise compliance. ...

IRISSCON 2024 to address AI’s dual impact on cybersecurity

The IRISSCERT Cyber Crime Conference (IRISSCON) returns on November 6th at the Aviva Stadium, where global cybersecurity leaders will explore AI’s revolutionary role in defending against and contributing to cyber threats. As Ireland’s ...

Top Traceable API Security Alternative: Escape vs. Traceable

Learn why Escape’s agentless discovery and developer-friendly testing make it a top Traceable alternative. The post Top Traceable API Security Alternative: Escape vs. Traceable appeared first on Security Boulevard.

Hiring guide: Key skills for cybersecurity researchers

In this Help Net Security interview, Rachel Barouch, an Organizational Coach for VCs and startups and a former VP HR in both a VC and a Cybersecurity startup, discusses the dynamics of cybersecurity researchers and team-building strategies. She ...

java security manager

java security managerContinue reading on Medium »

Whispr: Open-source multi-vault secret injection tool

Whispr is an open-source CLI tool designed to securely inject secrets from secret vaults, such as AWS Secrets Manager and Azure Key Vault, directly into your application’s environment. This enhances secure local software development by ...

Cybersecurity in crisis: Are we ready for what’s coming?

In this Help Net Security video, James Edgar, CISO at Corpay, reveals insights into cybersecurity health, concerns, challenges, and other considerations for building a solid defense program. Key insights revealed in Corpay’s 2024 State of ...

Strong privacy laws boost confidence in sharing information with AI

53% of consumers report being aware of their national privacy laws, a 17-percentage point increase compared to 2019, according to Cisco. Informed consumers are also much more likely to feel their data is protected (81%) compared to those who are ...

How Doppler scaled engineering with stakeholder-driven workflows

Discover how Doppler transformed its product and engineering workflows with a flexible, stakeholder-driven approach. The post How Doppler scaled engineering with stakeholder-driven workflows appeared first on Security Boulevard.