Application Security News and Articles


Arctic Wolf Acquires Cylance Endpoint Security Platform to Further AI Ambitions

Arctic Wolf this week revealed it has acquired the Cyclance endpoint security platform from Blackberry for $160 million. The post Arctic Wolf Acquires Cylance Endpoint Security Platform to Further AI Ambitions appeared first on Security Boulevard.

IAM Predictions for 2025: Identity as the Linchpin of Business Resilience

IAM Predictions for 2025: Identity as the Linchpin of Business Resilience madhav Thu, 12/19/2024 - 05:33 As we look toward 2025, the lessons of 2024 serve as a stark reminder of the rapidly evolving identity and access management (IAM) ...

Are threat feeds masking your biggest security blind spot?

Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those sources. The post Are threat feeds masking your biggest security blind ...

Leadership skills for managing cybersecurity during digital transformation

In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation. The ...

Apache Tomcat Conditional Competition Code Execution Vulnerability (CVE-2024-50379)

Overview Recently, NSFOCUS CERT detected that Apache issued a security announcement, fixing the Apache Tomcat conditional competition code execution vulnerability (CVE-2024-50379). Due to the inconsistency between Windows file system and Tomcat ...

Ransomware in 2024: New players, bigger payouts, and smarter tactics

In 2024, ransomware remained the top cybersecurity threat to organizations worldwide. New groups filled the void left by law enforcement crackdowns, targeting businesses with record-breaking ransom demands and sophisticated tactics. In this ...

Is Your Hospital Sharing Patient Data with Facebook? A Guide for Security and Privacy Teams

Recent lawsuits have revealed a critical privacy concern for healthcare providers – the sharing of patient data with Facebook through tracking pixels. We wrote this article to help your security and privacy teams assess their risk, identify key ...

Fighting on the New Front Line of Security with Snowflake and LogLMs

Tempo — a Snowflake Native App — harnesses AI and Log Language Models for Proactive Cybersecurity Cybersecurity attackers are innovating, challenging traditional security measures, and pushing organizations to seek more innovative ...

How Does Enhanced Access Control Bolster Your Security?

Why is Access Control Crucial in Cybersecurity? In the expansive and complex world of cybersecurity, have you ever wondered how vital a role access control plays? It’s the cornerstone of securing Non-Human Identities (NHIs) and managing their ...

How Secure Automation Saves Your Cloud Operations

Why is Secure Automation Essential for Cloud Operations? Modern businesses operate within a complex ecosystem. How can they ensure their cloud operations remain secure, streamlined, and efficient? The answer lies in secure automation. This blog ...

Scaling Secrets Security in High-Growth Environments

Is Secrets Security Management Crucial for High-Growth Environments? The digital age is expanding at an unprecedented rate, constantly evolving with revolutionary technologies that are redefining business models. In such high-growth environments, ...

Ground Rule of Cyber Hygiene: Keep Your Password Policy Up to Date

Since the earliest incidents of computer break-ins, experts have maintained that making the internet a safe place is going to be an uphill battle. Their reasons, while largely technical, also encompass human complacency. Research shows that most ...

Mobile Spear Phishing Targets Executive Teams

Over the past few months, enterprises have observed a pattern of sophisticated spearphishing attempts targeting their executives, with some specifically targeting their mobile devices. Our blog shares the details. The post Mobile Spear Phishing ...

DEF CON 32 – Exploiting Cloud Provider Vulnerabilities for Initial Access

Author/Presenter: Nick Frichette Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

DEF CON 32 – Gotta Cache ‘Em All Bending The Rules Of Web Cache Exploitatio

Authors/Presenters: Martin Doyhenard Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

Free Trial of aiSIEM-CGuard for 45 Days: Experience the Future of Cybersecurity

In today’s ever-evolving digital landscape, businesses face increasingly sophisticated cyber threats. Protecting sensitive data, ensuring compliance, and maintaining operational continuity have never been more critical. This is where Seceon’s ...

Contrast One: Managed Application Security (AppSec) Platform | Contrast Security

As a Contrast Security customer you already have the best-in-class security platform for applications and application programming interfaces (APIs). With Contrast, you can rest easy knowing you have fewer vulnerabilities and you can catch attacks ...

Managing Risks: Executive Protection in the Digital Age

The recent incident involving the United Healthcare CEO has sparked critical conversations in corporate boardrooms about the evolving threat landscape and the importance of robust security measures centered around executive protection. The ...

Staying Secure During the Holiday Shopping Season

The post Staying Secure During the Holiday Shopping Season appeared first on Votiro. The post Staying Secure During the Holiday Shopping Season appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Phase Change’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Phase Change’ appeared first on Security Boulevard.