Application Security News and Articles


Why software is the key to FI risk management

Risk management is important, but it’s not always exciting. Many risk professionals still rely on spreadsheets and manual methods despite the availability of better options. Excel is familiar and cost-effective. Some spreadsheets are handy for ...

Regulations, security, and remote work: Why network outsourcing is booming

A growing number of enterprises in the US are adopting managed network services to support AI and other new technologies across increasingly complex networks, according to ISG. US enterprises lead the way in network outsourcing The 2024 ISG ...

The state of cybersecurity and IT talent shortages

This article highlights key findings and trends in the 2024 IT and cybersecurity skills gap, from the shortage of cybersecurity talent to the rising demand for certifications and upskilling programs, offering insights into the current state of ...

Hottest cybersecurity open-source tools of the month: December 2024

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. SafeLine: Open-source web application firewall (WAF) SafeLine is an open-source and ...

Stay Ahead with Proactive Machine Identity Management

Why is Proactive Machine Identity Management Essential? With the increasing amount of sensitive data being managed and transferred throughout the digital sphere, it’s crucial to ask: How are we safeguarding our digital environment from threats? ...

Optimistic Security Outlook: Embrace Cloud Compliance Now

What is the Significance of Non-Human Identities in Cybersecurity? In the contemporary realm of cybersecurity, the focus is usually on human identities, but an equally critical and often overlooked domain is Non-Human Identities (NHIs). NHIs are ...

How Secret Management Delivers True Business Value

How Do Non-Human Identities Impact Secret Management? In recent times, have you wondered about the role Non-Human Identities (NHIs) play in your organization’s secret management strategy? Digesting the complexity of NHIs and their significance ...

Best of 2024: 30,000 Dealerships Down — ‘Ransomware’ Outage Outrage no. 2 at CDK Global

Spend more on security! Car and truck dealers fall back on pen and paper as huge SaaS provider gets hacked (again). The post Best of 2024: 30,000 Dealerships Down — ‘Ransomware’ Outage Outrage no. 2 at CDK Global appeared first on Security ...

California’s Pioneering AI Legislation: Shaping the Future of Artificial Intelligence

California has passed revolutionary legislation to regulate artificial intelligence, requiring companies to disclose training data and label AI-generated content. Starting 2026, these laws will transform how AI companies operate and how consumers ...

News alert: SquareX exposes OAuth attack on Chrome extensions — days before a major breach

Palo Alto, Calif., Dec. 30, 2024, CyberNewswire — SquareX, an industry-first Browser Detection and Response (BDR) solution, leads the way in browser security. About a week ago, SquareX reported large-scale attacks targeting Chrome Extension ...

DEF CON 32 – Warflying in a Cessna

Authors/Presenters: Matt Thomassen, Sean McKeever Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Randall Munroe’s XKCD ‘Sun Avoidance’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Sun Avoidance’ appeared first on Security Boulevard.

VW Cars Leak Private Data of 800,000 — ‘Volksdaten’

Cariad, VW Group’s software arm, made this classic error. The post VW Cars Leak Private Data of 800,000 — ‘Volksdaten’ appeared first on Security Boulevard.

EF CON 32 – Winning the Game of Active Directory

Authors/Presenters: Brandon Colley Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach

Palo Alto, Calif., USA, 30th December 2024, CyberNewsWire The post SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach appeared first on Security Boulevard.

Best of 2024: Microsoft Account Security Alert Email: Recognize the Scam

Reading Time: 5 min Have you received a microsoft account security alert email? Learn how to identify legitimate alerts and avoid phishing scams targeting your Microsoft account. The post Best of 2024: Microsoft Account Security Alert Email: ...

Reflecting on 2024 at Balbix + Looking Ahead to 2025

2024 has been a transformative year for Balbix. By pushing boundaries in AI and teaming up with industry leaders like NVIDIA, we’ve introduced innovations that are both powerful and easy to adopt. From groundbreaking product launches to earning ...

Navigating the SEC’s Cybersecurity Disclosure Rules: One Year On

In December 2023, as cyberattacks surged, the U.S. Securities and Exchange Commission (SEC)began enforcing new cybersecurity disclosure rules. This pushed C-level executives and boards to adopt measures for compliance and transparency. In this ...

Cybersecurity Resolutions for 2025: Prepare Your Business for What’s Ahead

Cybersecurity Resolutions for 2025: Prepare Your Business for What’s Ahead Cybersecurity Resolutions for 2025: Prepare Your Business for What’s Ahead As we approach the new year, it’s time to reflect on the cybersecurity challenges of 2024 ...

NSFOCUS ISOP Listed in The Security Analytics Platform Landscape Report by Forrester

SANTA CLARA, Calif., December 30, 2024 – We are thrilled to announce that NSFOCUS was selected as the notable vendor of Forrester The Security Analytics Platform Landscape, Q4 by its ISOP (Intelligent Security Operations Platform) with built-in ...