Application Security News and Articles


Stratodesk partners with deviceTRUST to improve security in today’s hybrid work environment

Stratodesk and deviceTRUST announced their security integration partnership. This partnership benefits customers by delivering an additional layer of security for workspace access and authorization. Stratodesk and deviceTRUST collaboration brings ...

Understanding the Latest Cybercrime Threats: A Conversation with Fraud Boxer and Arkose Labs

Phishing scams got you down? Worried about the rapid rise of Cybercrime-as-a-Service (CaaS)? Want to know more about the growing problem of International Revenue Share Fraud (IRSF)?  We’ve got just the thing for you! Check out this recent ...

CIS expands partnership with Akamai to protect state and local governments

Cyberattacks often begin with an unsuspecting user clicking on a link that redirects them to a harmful site containing malware. Even the best employee training won’t prevent every mistake. The best way to stop those mistakes from becoming ...

Aembit emerges from stealth and raises $16.6 million

Aembit has unveiled its official launch alongside $16.6M in seed financing from cybersecurity specialist investors Ballistic Ventures and Ten Eleven Ventures. Aembit helps companies apply a zero trust security framework to workload access, ...

5 Reasons Why a Strong Customer Identity Strategy Can Benefit Your Business

Whether deep consumer insights or delivering seamless and secure customer experiences, an identity management solution could help businesses stay ahead of the curve. Let’s uncover some of the top reasons your business needs an identity ...

Runtime Security Observability for Containerized Workloads in AWS

Recently we asked thought leaders from cutting-edge security teams to share their best practices for detecting and responding to threats in incredibly complex cloud environments. Here are some highlights from our most recent talk with Matt ...

Diamond Model of Intrusion Analysis: A Quick Guide

Any intrusion into a network calls for a thorough analysis to give security teams cyber intelligence about different threats and to help thwart similar future attacks. However, effective incident analysis has long been held back by uncertainty ...

High Availability: How It Works and Why It’s Important

High availability (HA) ensures that an IT infrastructure operates continuously, even if certain components fail. Learn why it's important and how to achieve it. The post High Availability: How It Works and Why It’s Important appeared first on ...

2022 Cybersecurity Annual Earnings Recap (Part 1)

Part 1 of a series analyzing annual earnings announcements, including Cloudflare, Check Point, CyberArk, and Fortinet. The post 2022 Cybersecurity Annual Earnings Recap (Part 1) appeared first on Security Boulevard.

Verosint Launches Account Fraud Detection and Prevention Platform

443ID is refocusing its solution to tackle account fraud detection and prevention, and has changed its name to Verosint. The post Verosint Launches Account Fraud Detection and Prevention Platform appeared first on SecurityWeek.

USENIX Security ’22 – ‘SCRAPS: Scalable Collective Remote Attestation For Pub-Sub IoT Networks With Untrusted Proxy Verifier’

Complete Title: USENIX Security '22 - Lukas Petzi, Ala Eddine Ben Yahya, Alexandra Dmitrienko, Gene Tsudik, Thomas Prantl, Samuel Kounev - ‘SCRAPS: Scalable Collective Remote Attestation For Pub-Sub IoT Networks With Untrusted Proxy ...

Financial Services Firms: Address FFIEC’s Stringent API Security Regulations with Noname Security

Financial services companies are a favorite target for threat actors. Most of us are familiar with the Equifax and Capital One breaches that exposed hundreds of millions of customer records. But there are other attacks that don’t make the ...

Data Encryption Methods and their Advantages and Disadvantages

Protecting data has become a critical part of every organization’s operation. However, choosing the best method of data encryption can be difficult with all the available options.   Here we discuss the various encryption methods available, the ...

CISA Launches Ransomware Vulnerability Warning Pilot

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently launched the Ransomware Vulnerability Warning Pilot (RVWP) program. Here’s what you need to know. What is CISA’s Ransomware Vulnerability Warning Pilot program? ...

Another One Bites the Dust: The (Apparent) End of Breach Forums

The cycle of fraud venue shutdowns continued on Wednesday, March 15, 2023, when Breach Forums administrator Conor Brian Fitzpatrick (aka “pompompurin”), was arrested and charged with a single count of conspiracy to commit access device fraud. ...

You’re One JavaScript Function Call Away From Using (Most) WebR R Functions In Your WebR-Powered Apps/Sites

After writing the initial version of a tutorial on wrapping and binding R functions on the javascript side of WebR, I had a number of other WebR projects on the TODO list. But, I stuck around noodling on the whole “wrapping & binding” ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnarav – ‘#233 – Burning Platform’

via the respected Software Engineering expertise of Mikkel Noe-Nygaard as well as the lauded Software Engineering and Enterprise Agile Coaching talent of Luxshan Ratnarav at Comic Agilé! Permalink The post Comic Agilé – Mikkel ...

Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager

The Play ransomware gang has published data stolen from Dutch maritime services company Royal Dirkzwager. The post Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager appeared first on SecurityWeek.

What’s in an SBOM?  

More and more organizations are deploying a software bill of materials (SBOM) to identify and track the various components of the software products they develop or use. The goals of using SBOM might include a desire to enhance software security, ...

The Top 6 BrandShield Competitors for 2023

There's many options on the market for software to safeguard your business against logo infringement and brand attacks. Checkout our list of the top companies to choose from. The post The Top 6 BrandShield Competitors for 2023 appeared first on ...