Application Security News and Articles


Anomaly Detection for Cybersecurity

A long promising approach comes of age I won’t revisit the arguments for anomaly detection as a crucial piece of cybersecurity. We’ve seen waves of anomaly detection over the years — and CISA, DARPA, Gartner, and others have explained ...

Gain Relief with Strategic Secret Governance

Why is Efficient Secret Governance Essential? Have you ever pondered the importance of strategic secret governance and what it means to your cybersecurity strategy? In the evolving landscape of threats and vulnerabilities, it’s essential to ...

Innovation in API Security: What’s New

So, What’s the Deal with Recent API Security Innovations? As companies across the spectrum of industries including finance, healthcare, travel, and more intensify their adoption of digital technologies, there’s an undeniable need for robust ...

Robots.txt: From Basic Crawler Control to AI-Powered Security Shield

Discover how robots.txt has evolved from basic crawler control to a sophisticated security instrument. Learn practical strategies for using this simple file to enhance your website's security posture and protect your brand in the age of AI. The ...

DEF CON 32 – XR for All: Accessibility and Privacy for Disabled Users

Authors/Presenters: Dylan Fox Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Budget-Friendly Security Solutions That Work

Are You Adopting Cost-Effective Security Protocols? As a cybersecurity specialist, you might have often questioned how you could manage your security measures effectively without breaking your budget. When handling Non-Human Identities (NHIs) and ...

Reassured Compliance in Multi-Cloud Environments

The Surefire Path to Reassured Security in Cloud Environments Is your organization grappling with the challenge of maintaining security in complex multi-cloud environments? Non-Human Identity (NHI) and secrets management may just be the silver ...

Best of 2024: AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again

Should’ve used MFA: $T loses yet more customer data—this time, from almost all of them. The post Best of 2024: AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again appeared first on Security Boulevard.

DEF CON 32 – Offensive Security Testing Safeguarding the Final Frontier

Authors/Presenters: Andrzej Olchawa Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

Navigating the Pixel Minefield: Strategies for Risk Mitigation

In the previous posts, we explored the world of web pixels, uncovering potential privacy risks and highlighting the importance of a thorough audit. Now, let’s shift our focus to actionable strategies for mitigating these risks and ensuring your ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #318 — Working for a Big Consultancy

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel ...

Detection Engineering: A Case Study

In this blog post, we will explore the intricate world of detection engineering. We’ll start by examining the inputs and outputs of detection engineering, and then we’ll illustrate the detection engineering lifecycle. The post Detection ...

Canvas fingerprinting in the wild

Every day, your computer renders dozens of these without you even noticing. Strange patterns, colorful shapes, and emojis—what do you think these are? These are canvas fingerprints, a technique used by the vast majority of websites to ...

5 books I enjoyed in 2024

Have you ever found yourself in a bookstore, overwhelmed by the sheer number of titles and unsure of where to start? Well, let me make it easier for you. Here are five books that I highly recommend, as I found them to be absolutely brilliant. 1. ...

DEF CON 32 – Using AI Computer Vision In Your OSINT Data Analysis

Authors/Presenters: Mike Raggo Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Best of 2024: CVE-2024-38063: An In-Depth Look at the Critical Remote Code Execution Vulnerability

In a recent security advisory, Microsoft disclosed a high-severity vulnerability identified as CVE-2024-38063. This critical Remote Code Execution (RCE) flaw, rated with a CVSS score of 9.8, poses a significant... The post CVE-2024-38063: An ...

Cybersecurity Snapshot: What Looms on Cyberland’s Horizon? Here’s What Tenable Experts Predict for 2025

Wondering what cybersecurity trends will have the most impact in 2025? Check out six predictions from Tenable experts about cyber issues that should be on your radar screen in the new year — including AI security, data protection, cloud ...

Choosing the Right Cyber Risk Management Solution: RFI vs. RFP and Beyond

Selecting a cyber risk management solution is a critical decision for any organization. The process requires careful consideration of your needs, how a platform can meet them, and how the solution supports legacy GRC functions. This post will ...

What is the Process of ISO 27001 Certification?

In 2025, the cost of cyberattacks will reach $10.5 trillion globally. The projected growth rate is 15% every year. While the cost of attack keeps increasing, a breach is now identified in 194 days on average. It takes 64 days to contain a breach ...

What is a Software Publisher Certificate and How do You Get One?

Learn what a Software Publisher Certificate is, why it matters for secure software distribution, and how to obtain one step by step.Continue reading on Medium »