Application Security News and Articles


Travel Cybersecurity Threats and How to Stay Protected

Uncover the latest travel cybersecurity threats, from public Wi-Fi risks to AI-powered attacks. Learn strategies to protect your data and travel safely. The post Travel Cybersecurity Threats and How to Stay Protected appeared first on Security ...

CrowdStrike Allies With Salt Security to Improve API Security

CrowdStrike and Salt Security have extended their alliance to make it simpler to feed application programming interface (API) security data directly into a security information event management (SIEM) platform. The post CrowdStrike Allies With ...

CISO accountability: Navigating a landscape of responsibility

What was once primarily a technical role, CISOs now find themselves accountable for organizational risk, regulatory compliance, and even legal liabilities across the entire organization. However, as cyber threats intensify, it’s clear that ...

Key steps to scaling automated compliance while maintaining security

In this Help Net Security interview, Vivek Agarwal, Privacy Program Manager at Meta Platforms, shares insights on strategies for reducing time to market, improving vendor onboarding, and updating privacy requirements to ensure compliance across ...

Why Over-the-Air Updates are Key for Mobile App Security in the AI Era

  The rapid pace of technological advancements, particularly in artificial intelligence (AI), has transformed both the opportunities and threats in the mobile app ecosystem. This blog describes why over-the-air (OTA) updates to security ...

Vanir: Open-source security patch validation for Android

Google’s open-source tool Vanir enables Android developers to quickly scan custom platform code for missing or applicable security patches. By automating patch validation, Vanir helps OEMs deliver critical security updates faster, enhancing ...

Consumers wrongly attribute all data breaches to cybercriminals

Breaches in 2024 had less impact on consumers’ trust in brands compared to the previous year (a 6.5% decrease from 62% in 2023 to 58% in 2024), according to a recent Vercara report. Most consumers also remain unaware of the role they may play ...

Securing SaaS – Lessons, Trends, and Strategies for 2025 with Guest Forrester

Our guest speaker, Forrester Vice President, Principal Analyst, Andras Cser, will share key insights on the risks and trends shaping the SaaS security landscape as we move into 2025. The post Securing SaaS – Lessons, Trends, and Strategies for ...

Securing Your SaaS: How AppOmni Mitigates SaaS Risks and Protects Data

In this 20 minute session, we’ll introduce you to AppOmni, the platform designed to reduce SaaS data exposure, detect threats, and prevent data breaches. The post Securing Your SaaS: How AppOmni Mitigates SaaS Risks and Protects Data appeared ...

Achieving Stability in Cloud Compliance and Security

Can Cybersecurity Truly Achieve Stability in the Cloud? The increasing adoption of cloud technologies in various industries, from healthcare to financial services, makes the question of stability in cloud compliance and security a top priority. ...

A Strong Executive Protection Program Is Now More Important Than Ever — Here’s How To Get Buy-In

The shocking killing of UnitedHealthcare’s CEO highlights the critical importance of corporate executive protection programs  The fatal shooting of UnitedHealthcare CEO Brian Thompson was a targeted and shocking act of violence. For many of ...

DEF CON 32 – HookChain A New Perspective For Bypassing EDR Solutions

Authors/Presenters: Helvio Carvalho Junior Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; ...

How to Assess Virtual Machines Prior to Deployment with Spectra Assure

Many software development shops deliver their product releases via virtual machine (VM) disk images. Whether deployed to a cloud environment, data center, or elsewhere, delivering safe and secure images is vital. If vulnerabilities, malware, or ...

Randall Munroe’s XKCD ‘METAR’

Permalink The post Randall Munroe’s XKCD ‘METAR’ appeared first on Security Boulevard.

Is Your Website Leaking Sensitive Patient Information to Facebook? A disturbing story about HIPAA (and How to Avoid It)

Picture this scenario: You’ve used every tool you have to secure your web pages and forms so patient information is safe. One day, a potential patient Googles “hysterectomy options” and ends up on your hospital’s website. They browse ...

Classroom Manager: Online Classroom Management, Instruction, and Learning Made Easy

Technology is transforming teaching and learning in today’s classrooms by providing teachers and students with an ever-increasing array of digital tools and resources. The possibilities for innovation are endless, from video conferencing to ...

Reflecting on a Year of Compromised Data

The cybersecurity landscape over the past 12 months shows that It’s been a banner year of compromised credential data collection. The post Reflecting on a Year of Compromised Data appeared first on Security Boulevard.

Balbix is recognized in Forrester’s CRQ Solutions Landscape, Q4 2024

Last week, Balbix was recognized in the Forrester Cyber Risk Quantification (CRQ) Solutions Landscape, Q4 2024. You can read the report here. Increasingly, CRQ has become a key tool for security leaders for executive reporting, risk ...

DEF CON 32 – Leveraging Private APNs For Mobile Network Traffic Analysis

Author/Presenter: Aapo Oksman Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

5 Modern Computer Safety Tips You Should Know About

Protecting your computer in the hyper-connected world of today goes beyond merely preventing bothersome viruses. Smarter, quicker, and far more invasive than ever before are modern dangers. Cybercriminals no longer depend on simple strategies; ...