Application Security News and Articles


Cybersecurity Insights with Contrast CISO David Lindner | 12/20/24

Insight No. 1: Forget the hype. Cloud security is a battlefield, and you're woefully unprepared. Let's cut the crap. Everyone's talking about cloud security, but most organizations are still playing catch-up. You think those cloud providers have ...

Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight

Check out the new cloud security requirements for federal agencies. Plus, beware of North Korean government operatives posing as remote IT pros. Also, learn how water plants can protect their HMIs against cyberattacks. And get the latest on the ...

OPSWAT Acquires Fend to Extend Cybersecurity Reach Into OT Platforms

OPSWAT this week revealed it has acquired Fend, Inc. to further extend the reach of its cybersecurity portfolio into the realm of operational technology (OT). The post OPSWAT Acquires Fend to Extend Cybersecurity Reach Into OT Platforms appeared ...

CISA: Use Signal or other secure communications app

In the wake of the widespread compromise of US telecom giants’ networks by Chinese hackers and the FBI advising Americans to use end-to-end encrypted communications, CISA is advising “highly targeted individuals” – senior ...

How Zimperium Can Help With Advanced Spyware Such as NoviSpy

Discover how Zimperium can help with advanced spyware such as NoviSpy. The post How Zimperium Can Help With Advanced Spyware Such as NoviSpy appeared first on Zimperium. The post How Zimperium Can Help With Advanced Spyware Such as NoviSpy ...

Another NetWalker affiliate sentenced to 20 years in prison

A 30-year old Romanian man was sentenced to 20 years in prison for leveraging the Netwalker ransomware to extort money from victims, the US Department of Justice announced on Thursday. Daniel Christian Hulea, of Jucu de Mijloc, Cluj, Romania, was ...

What is Security Testing? A Beginner’s Guide

Explore how security testing safeguards your applications, tackles threats like SQL injection, and ensures robust protection with advanced tools and techniques. The post What is Security Testing? A Beginner’s Guide appeared first on Security ...

Insider Threat Indicators

Nisos Insider Threat Indicators Security threats can come from trusted individuals within your organization or partners, contractors, and service providers with authorized access to sensitive systems and data... The post Insider Threat Indicators ...

How Data Classification Reduces Insider Threats 

Companies can significantly reduce insider threat risks with a suitable data classification strategy that adequately manages and protects sensitive information.  The post How Data Classification Reduces Insider Threats  appeared first on ...

Human Risk Management: The “Weakest Link” Emerges as Key to Cybersecurity

With technology front and center in virtually all business processes, it may seem counterintuitive to suggest that today’s greatest cybersecurity risks don’t stem from technology, but from people. It’s widely recognized that people pose ...

Zero-Trust in Web3: Redefining Security for Decentralized Systems 

By adopting zero-trust principles, we can build systems that are not only decentralized but also secure, resilient and future-proof.  The post Zero-Trust in Web3: Redefining Security for Decentralized Systems  appeared first on Security Boulevard.

The Avast Phishing Awards: Trickiest email headlines of 2024

2024 has been filled with many ups, downs ... and scams. As we navigate the treacherous waters of the digital realm, let’s take a moment and make note of the tactics behind the phishing emails that graced millions of inboxes across the world ...

Why cybersecurity is critical to energy modernization

In this Help Net Security interview, Anjos Nijk, Managing Director of the European Network for Cyber security (ENCS), discusses cybersecurity in the energy sector as it modernizes with renewable sources and smart grid technologies. Nijk also ...

AI is becoming the weapon of choice for cybercriminals

AI changes how organizations look at cybersecurity GenAI is compromising security while promising efficiency This article highlights key findings from 2024 reports on AI and GenAI technologies, focusing on their potential and major challenges. ...

46% of financial institutions had a data breach in the past 24 months

As the financial industry is the most targeted sector for data breaches in 2024, it’s now more important than ever to strengthen the industry moving into 2025, according to SailPoint. Financial institutions face growing cyber threats In 2024, ...

New infosec products of the week: December 20, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Appdome, GitGuardian, RunSafe Security, Stairwell, and Netwrix. GitGuardian launches multi-vault integration to combat secrets sprawl GitGuardian ...

Navigating the New Era of AI Traffic: How to Identify and Block AI Scrapers

In the not-so-distant past, webmasters faced challenges from bots like Google’s search spiders, which diligently scanned websites to index content and provide the best search results for users. Fast forward to today, and we are witnessing a new ...

Is Your Cloud Infrastructure Truly Protected?

Can You Confidently State Your Cloud Infrastructure is Safe? For businesses harnessing the power of the cloud, the pressing question remains: Can you claim to have absolute assurance of your cloud security? As the rapid adoption of cloud ...

Empower Your Team with Effective Secrets Management

Why is Secrets Management Crucial for Your Cybersecurity Team? Imagine this: your cybersecurity team is overwhelmed with managing countless sensitive codes, tokens, and passwords. Their efficiency is hampered, and this puts your data at a ...

Stay Ahead: Key Tactics in Identity Protection

Why is Identity Protection a Crucial Component of Cybersecurity? As cyber threats grow increasingly complex and sophisticated, organizations face an urgent need to bolster their security architecture. One critical aspect that often gets ...